Here it is..
11:16:21.138 [main] DEBUG o.j.rest.internal.InvokeHttpMethod - >> invoking extension:list 11:16:21.161 [main] DEBUG o.j.rest.internal.InvokeHttpMethod - >> invoking AuthenticationApi.authenticateWithTenantNameAndCredentials 11:16:21.161 [main] DEBUG o.j.h.i.JavaUrlHttpCommandExecutorService - Sending request -157697619: POST http://10.xx.xx.xx:5000/v2.0/tokens HTTP/1.1 11:16:21.161 [main] DEBUG jclouds.wire - >> "{"auth":{"passwordCredentials":{"username":"admin","password":"cloud"},"tenantName":"admin"}}" 11:16:21.162 [main] DEBUG jclouds.headers - >> POST http://10.xx.xx.xx:5000/v2.0/tokens HTTP/1.1 11:16:21.162 [main] DEBUG jclouds.headers - >> Accept: application/json 11:16:21.162 [main] DEBUG jclouds.headers - >> Content-Type: application/json 11:16:21.162 [main] DEBUG jclouds.headers - >> Content-Length: 97 11:16:21.352 [main] DEBUG o.j.h.i.JavaUrlHttpCommandExecutorService - Receiving response -157697619: HTTP/1.1 200 OK 11:16:21.353 [main] DEBUG jclouds.headers - << HTTP/1.1 200 OK 11:16:21.353 [main] DEBUG jclouds.headers - << Date: Mon, 03 Aug 2015 05:36:53 GMT 11:16:21.353 [main] DEBUG jclouds.headers - << Vary: X-Auth-Token 11:16:21.354 [main] DEBUG jclouds.headers - << X-Distribution: Ubuntu 11:16:21.354 [main] DEBUG jclouds.headers - << Connection: keep-alive 11:16:21.354 [main] DEBUG jclouds.headers - << Content-Type: application/json 11:16:21.354 [main] DEBUG jclouds.headers - << Content-Length: 7905 11:16:21.361 [main] DEBUG jclouds.wire - << "{"access": {"token": {"issued_at": "2015-08-03T05:36:53.579351", "expires": "2015-08-03T06:36:53Z", "id": "MIIN-QYJKoZIhvcNAQcCoIIN7jCCDeoCAQExCTAHBgUrDgMCGjCCDFMGCSqGSIb3DQEHAaCCDEQEggxAeyJhYpxRlf6KgzDnm1ZiJLoBX4pBsqJTrYycyqWuehC0lFmVOhJJhLkqVmiGQUMjbvzGfAeZkPNFL-aTj3SUbQRqmTnsVJGSxF+U", "tenant": {"description": "Admin Tenant - Do Not Delete", "enabled": true, "id": "eba51ca10658497289cdef23d3514e33", "name": "admin"}}, "serviceCatalog": [{"endpoints": [{"adminURL": "http://10.xx.xx.xx:8774/v2/eba51ca10658497289cdef23d3514e33", "region": "regionOne", "internalURL": "http://10.xx.xx.xx:8774/v2/eba51ca10658497289cdef23d3514e33", "id": "54cd9169b9fa4fc3b221e24ebdaf1e38", "publicURL": "http://10.xx.xx.xx:8774/v2/eba51ca10658497289cdef23d3514e33"}], "endpoints_links": [], "type": "compute", "name": "nova"}, {"endpoints": [{"adminURL": "http://10.xx.xx.xx:9696", "region": "regionOne", "internalURL": "http://10.xx.xx.xx:9696", "id": "769e144c187a4f1f80e7f24cd2b88ee6", "publicURL": "http://10.xx.xx.xx:9696"}], "endpoints_links": [], "type": "network", "name": "neutron"}, {"endpoints": [{"adminURL": "http://10.xx.xx.xx:8776/v2/eba51ca10658497289cdef23d3514e33", "region": "regionOne", "internalURL": "http://10.xx.xx.xx:8776/v2/eba51ca10658497289cdef23d3514e33", "id": "26450879453e4b0eab0a6c68fc66b54f", "publicURL": "http://10.xx.xx.xx:8776/v2/eba51ca10658497289cdef23d3514e33"}], "endpoints_links": [], "type": "volumev2", "name": "cinderv2"}, {"endpoints": [{"adminURL": "http://10.xx.xx.xx:9292", "region": "regionOne", "internalURL": "http://10.xx.xx.xx:9292", "id": "1be85c08f9244b2c8cf37540b7bf6f2a", "publicURL": "http://10.xx.xx.xx:9292"}], "endpoints_links": [], "type": "image", "name": "glance"}, {"endpoints": [{"adminURL": "http://10.xx.xx.xx:8777", "region": "regionOne", "internalURL": "http://10.xx.xx.xx:8777", "id": "7428e3c2f8ba4e61b6fd524e8fa8f027", "publicURL": "http://10.xx.xx.xx:8777"}], "endpoints_links": [], "type": "metering", "name": "ceilometer"}, {"endpoints": [{"adminURL": "http://10.xx.xx.xx:8776/v1/eba51ca10658497289cdef23d3514e33", "region": "regionOne", "internalURL": "http://10.xx.xx.xx:8776/v1/eba51ca10658497289cdef23d3514e33", "id": "2905b83ade494664b38537c1b4702c3b", "publicURL": "http://1 10.xx.xx.xx :8776/v1/eba51ca10658497289cdef23d3514e33"}], "endpoints_links": [], "type": "volume", "name": "cinder"}, {"endpoints": [{"adminURL": " http://stgproxy:8080", "region": "regionOne", "internalURL": " http://stgproxy:8080/v1/AUTH_eba51ca10658497289cdef23d3514e33", "id": "308462c692314243b50e4b02946347a6", "publicURL": " http://stgproxy:8080/v1/AUTH_eba51ca10658497289cdef23d3514e33"}], "endpoints_links": [], "type": "object-store", "name": "swift"}, {"endpoints": [{"adminURL": "http://10.xx.xx.xx:35357/v2.0", "region": "regionOne", "internalURL": "http://10.xx.xx.xx:5000/v2.0", "id": "337333b5c09b447684743604bd114dc2", "publicURL": "http://10.xx.xx.xx:5000/v2.0"}], "endpoints_links": [], "type": "identity", "name": "keystone"}], "user": {"username": "admin", "roles_links": [], "id": "04642f0017924fe88a3f020475bb7626", "roles": [{"name": "_member_"}, {"name": "admin"}], "name": "admin"}, "metadata": {"is_admin": 0, "roles": ["9fe2ff9ee4384b1894a90878d3e92bab", "ffd9f2e9a7504857b32a3050d3fa89ae"]}}}" 11:16:21.399 [main] DEBUG o.j.h.i.JavaUrlHttpCommandExecutorService - Sending request 1529183212: GET http://10.xx.xx.xx:5000/v2.0/extensions HTTP/1.1 11:16:21.399 [main] DEBUG jclouds.headers - >> GET http://10.xx.xx.xx:5000/v2.0/extensions HTTP/1.1 11:16:21.399 [main] DEBUG jclouds.headers - >> Accept: application/json 11:16:21.399 [main] DEBUG jclouds.headers - >> X-Auth-Token: MIIN-QYJKoZIhvcNAQcCoIIN7jCCDeoCAQExCTAHBgUrDgMCGjCCDFMGCSqGSIb3DQEHAaCCDEQEggxAeyJhYuDR9fdeSWAV3LhzF6Bni1wldqeKRL5rjVKEW4SANLEjFzHMBSsoU8Ar4x4Q63xeSIB9H8H1800vikVKHpxRlf6KgzDnm1ZiJLoBX4pBsqJTrYycyqWuehC0lFmVOhJJhLkqVmiGQUMjbvzGfAeZkPNFL-aTj3SUbQRqmTnsVJGSxF+U 11:16:21.414 [main] DEBUG o.j.h.i.JavaUrlHttpCommandExecutorService - Receiving response 1529183212: HTTP/1.1 200 OK 11:16:21.414 [main] DEBUG jclouds.headers - << HTTP/1.1 200 OK 11:16:21.414 [main] DEBUG jclouds.headers - << Date: Mon, 03 Aug 2015 05:36:53 GMT 11:16:21.414 [main] DEBUG jclouds.headers - << Vary: X-Auth-Token 11:16:21.415 [main] DEBUG jclouds.headers - << X-Distribution: Ubuntu 11:16:21.415 [main] DEBUG jclouds.headers - << Connection: keep-alive 11:16:21.415 [main] DEBUG jclouds.headers - << Content-Type: application/json 11:16:21.415 [main] DEBUG jclouds.headers - << Content-Length: 1438 11:16:21.416 [main] DEBUG jclouds.wire - << "{"extensions": {"values": [{"updated": "2013-12-17T12:00:0-00:00", "name": "OpenStack Federation APIs", "links": [{"href": "https://github.com/openstack/identity-api", "type": "text/html", "rel": "describedby"}], "namespace": " http://docs.openstack.org/identity/api/ext/OS-FEDERATION/v1.0", "alias": "OS-FEDERATION", "description": "OpenStack Identity Providers Mechanism."}, {"updated": "2013-07-07T12:00:0-00:00", "name": "OpenStack Keystone User CRUD", "links": [{"href": "https://github.com/openstack/identity-api", "type": "text/html", "rel": "describedby"}], "namespace": " http://docs.openstack.org/identity/api/ext/OS-KSCRUD/v1.0", "alias": "OS-KSCRUD", "description": "OpenStack extensions to Keystone v2.0 API enabling User Operations."}, {"updated": "2013-07-07T12:00:0-00:00", "name": "OpenStack EC2 API", "links": [{"href": " https://github.com/openstack/identity-api", "type": "text/html", "rel": "describedby"}], "namespace": " http://docs.openstack.org/identity/api/ext/OS-EC2/v1.0", "alias": "OS-EC2", "description": "OpenStack EC2 Credentials backend."}, {"updated": "2014-01-20T12:00:0-00:00", "name": "OpenStack Simple Certificate API", "links": [{"href": "https://github.com/openstack/identity-api", "type": "text/html", "rel": "describedby"}], "namespace": " http://docs.openstack.org/identity/api/ext/OS-SIMPLE-CERT/v1.0", "alias": "OS-SIMPLE-CERT", "description": "OpenStack simple certificate retrieval extension"}]}}" *java.lang.IllegalStateException*: Optional.get() cannot be called on an absent value at com.google.common.base.Absent.get(*Absent.java:47*) at JCloud.test.KeystoneClient.roleDetails(*KeystoneClient.java:96*) at JCloud.test.KeystoneClient.main(*KeystoneClient.java:36*) On Fri, Jul 31, 2015 at 6:57 PM, Zack Shoylev <zack.shoy...@rackspace.com> wrote: > Can you get us some wire logs for that issue? > > https://jclouds.apache.org/reference/logging/ > > ________________________________________ > From: Alka Beniwal <beniwala...@gmail.com> > Sent: Friday, July 31, 2015 6:07 AM > To: dev@jclouds.apache.org; Ignasi Barrera > Subject: Re: FW: Error in JCloud KeystoneApi getRoleAdminApi > > Hi all, > > Still I am getting same error. > > > On Thu, Dec 11, 2014 at 2:03 PM, Alka Beniwal <beniwala...@gmail.com> > wrote: > > > Hi Igansi, > > > > I am using keystone administrative API endpoint for connection. > > > > Thanks, > > Regards, > > AB > > > > > > On Thu, Dec 11, 2014 at 12:15 PM, Ignasi Barrera <n...@apache.org> > wrote: > > > >> There should be the OS-KSADM extension, which it is enabled by default > >> IIRC. Which endpoint are you connecting to? > >> El 11/12/2014 06:35, "Alka Beniwal" <beniwala...@gmail.com> escribió: > >> > >> > Hi Jeremy, > >> > > >> > As u told I executed Set<Extension> extensions = > >> > keystoneApi.getExtensionApi().list(); > >> > and in output list I got > >> > > >> > Extension{id=OS-FEDERATION, name=OpenStack Federation APIs > >> > Extension{id=OS-KSCRUD, name=OpenStack Keystone User CRUD > >> > Extension{id=OS-EC2, name=OpenStack EC2 API, > >> > Extension{id=OS-SIMPLE-CERT, name=OpenStack Simple Certificate API > >> > > >> > Roleadmin extension APi is not there. > >> > > >> > > >> > Thanks, > >> > Regards, > >> > AB > >> > > >> > On Wed, Dec 10, 2014 at 11:15 PM, Ignasi Barrera <n...@apache.org> > >> wrote: > >> > > >> > > Just to complete Jeremy's checklist, also make sure you're > connecting > >> to > >> > > the admin endpoint; double check the port. IIRC that extension is > not > >> > > exposed in the default endpoint. > >> > > El 10/12/2014 18:35, "Jeremy Daggett" <jeremy.dagg...@rackspace.com > > > >> > > escribió: > >> > > > >> > > > Forwarding to user@Š > >> > > > > >> > > > Hi Alka! > >> > > > > >> > > > It could be one of the following scenarios you are running in to: > >> > > > > >> > > > - the extension is not available in your OpenStack installation > >> > > > - the user does not have an Admin role to access this specific API > >> > > > > >> > > > Does the extension show up when executing this code? > >> > > > > >> > > > Set<Extension> extensions = > keystoneApi.getExtensionApi().list(); > >> > > > // iterate through to see what extensions are available... > >> > > > > >> > > > Please let us know, thanks! > >> > > > > >> > > > /jd > >> > > > > >> > > > On 12/9/14, 9:27 PM, "Alka Beniwal" <beniwala...@gmail.com> > wrote: > >> > > > > >> > > > >Hi, > >> > > > > > >> > > > >I am developing a code to retrieve list of roles in OpenStack. > >> > > > > > >> > > > >*Code-* > >> > > > > RoleAdminApi roleAdminApi= > >> > keystoneApi.getRoleAdminApi().get();//error > >> > > > > FluentIterable<? extends Role> list1 = > roleAdminApi.list(); > >> > > > > > >> > > > >*Error-* > >> > > > >java.lang.IllegalStateException: Optional.get() cannot be called > >> on an > >> > > > >absent value > >> > > > > > >> > > > > > >> > > > >Any help is appreciated. > >> > > > > > >> > > > > > >> > > > > > >> > > > > > >> > > > >-- > >> > > > >Thanks, > >> > > > >Regards, > >> > > > >AB > >> > > > > >> > > > > >> > > > >> > > >> > > > > >