Skip to content

Instantly share code, notes, and snippets.

JOHNNYWA-M-X2YG:saio-ansible johnnywa$ ansible-playbook site.yml -i "130.211.203.240,"
[DEPRECATION WARNING]: Instead of sudo/sudo_user, use become/become_user and make sure become_method is 'sudo' (default).
This feature will be removed in a
future release. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg.
PLAY [all] *********************************************************************
TASK [setup] *******************************************************************
The authenticity of host '130.211.203.240 (130.211.203.240)' can't be established.
ECDSA key fingerprint is SHA256:mYYI2OrpxJXRRysGnO+wTPgs9Mrz6sc61HkZ7k1VZAQ.
JOHNNYWA-M-X2YG:tmp johnnywa$ git clone https://github.com/chianingwang/saio-ansible.git
Cloning into 'saio-ansible'...
remote: Counting objects: 144, done.
remote: Compressing objects: 100% (100/100), done.
remote: Total 144 (delta 43), reused 99 (delta 12), pack-reused 0
Receiving objects: 100% (144/144), 21.70 KiB | 0 bytes/s, done.
Resolving deltas: 100% (43/43), done.
Checking connectivity... done.
JOHNNYWA-M-X2YG:tmp johnnywa$ cd saio-ansible/
JOHNNYWA-M-X2YG:saio-ansible johnnywa$ ls
[vagrant@localhost swift]$ ./.functests
SKIPPING FUNCTIONAL TESTS SPECIFIC TO AUTH VERSION 3
SKIPPING FUNCTIONAL TESTS SPECIFIC TO SERVICE TOKENS
SKIPPING FUNCTIONAL TESTS DUE TO NO CONFIG FOR RESELLER ADMIN
running=SWIFT_TEST_DEBUG_LOGS=${SWIFT_TEST_DEBUG_LOGS} ${PYTHON:-python} -m subunit.run discover -t ./ ${TESTS_DIR:-./test/functional/}
{0} test.functional.test_access_control.TestRBAC.test_rbac ... SKIPPED:
{0} test.functional.test_access_control.TestRBAC.test_rbac_with_service_prefix ... SKIPPED:
SKIPPING FUNCTIONAL TESTS SPECIFIC TO AUTH VERSION 3
SKIPPING FUNCTIONAL TESTS SPECIFIC TO SERVICE TOKENS
SKIPPING FUNCTIONAL TESTS DUE TO NO CONFIG FOR RESELLER ADMIN
We couldn’t find that file to show.
#!/bin/bash
keystone tenant-list|grep -v -- "-----"|egrep -v "id.*\|.*name"|awk '{ print $2 }'|while read TENANT; do
echo $TENANT
keystone user-list --tenant $TENANT|grep -v -- "-----"|egrep -v "id.*\|.*name"|awk '{ print $2 }'|while read USER;do
echo " @ $USER"
keystone user-role-list --user $USER --tenant_id $TENANT|grep -v -- "-----"|egrep -v "id.*\|.*name"|awk '{ print $2 }'|while read ROLE; do
echo " > $ROLE"
done
done