Hi Marco, Thanks
Yes,we know it but not able to find where to set project I'd in Robot vm. Kapil On 6 Sep 2017, at 7:24 PM, "PLATANIA, MARCO (MARCO)" <plata...@research.att.com<mailto:plata...@research.att.com>> wrote: It should be your OpenStack project ID. Marco From: "Kapil Gupta (c)" <gka...@vmware.com> Date: Wednesday, September 6, 2017 at 9:18 AM To: "PLATANIA, MARCO (MARCO)" <plata...@research.att.com>, "ROSE, DANIEL V" <dr6...@att.com>, "onap-discuss@lists.onap.org" <onap-discuss@lists.onap.org> Subject: RE: vFW demo setup issue Hi Marco, I fix 'wrong version number by replacing https://10.110.208.162<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.208.162&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=c9iFcjCROGq-1FEvZ6DWnV4SLvpcaadOa6tQp0fGf6w&e=> to http://10.110.208.162<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=gxPN0HBFJcgvoXgBKKGQagTeqsVMuF_gNwHMsb3UgNo&e=> Now we are getting “KeyError: 'tenant'” while run “demo.sh init” . Please let me know where to set tenant_id in robot vm. Thanks Kapil From: Kapil Gupta (c) Sent: 06 September 2017 16:57 To: 'PLATANIA, MARCO (MARCO)' <plata...@research.att.com>; ROSE, DANIEL V <dr6...@att.com>; onap-discuss@lists.onap.org Subject: RE: vFW demo setup issue Hi Marco, Thanks for your input. After fix certificate error, facing 'wrong version number” while running “./demo.sh init” Please note token request from robot vm “curl -i -X POST http://10.110.208.162:35357/v2.0/tokens<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A35357_v2.0_tokens&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=U6uZbV_e1mMoChuqVQK09uimHVJxdECNGwMGv3torQ0&e=>” is successful ---logs attached below. Please let me know to how move further root@onap-vm-robot:/opt# ./demo.sh init DefaultVerifyPaths(cafile=None, capath='/usr/lib/ssl/certs', openssl_cafile_env='SSL_CERT_FILE', openssl_cafile='/usr/lib/ssl/cert.pem', openssl_capath_env='SSL_CERT_DIR', openssl_capath='/usr/lib/ssl/certs') Starting Xvfb on display :89 with res 1280x1024x24 Executing robot tests at log level TRACE Initialize Customer And Models | FAIL | ConnectionError: HTTPSConnectionPool(host='10.110.208.162', port=35357): Max retries exceeded with url: /v2.0/tokens (Caused by SSLError(SSLError("bad handshake: Error([('SSL routines', 'ssl3_get_record', 'wrong version number')],)",),)) Traceback (most recent call last): File "/var/opt/OpenECOMP_ETE/robot/library/RequestsLibrary/RequestsKeywords.py", line 421, in post_request timeout) File "/var/opt/OpenECOMP_ETE/robot/library/RequestsLibrary/RequestsKeywords.py", line 871, in _body_request cookies=self.cookies) File "/var/opt/OpenECOMP_ETE/robot/library/requests/sessions.py", line 549, in post return self.request('POST', url, data=data, json=json, **kwargs) File "/var/opt/OpenECOMP_ETE/robot/library/requests/sessions.py", line 502, in request resp = self.send(prep, **send_kwargs) File "/var/opt/OpenECOMP_ETE/robot/library/requests/sessions.py", line 612, in send r = adapter.send(request, **kwargs) File "/var/opt/OpenECOMP_ETE/robot/library/requests/adapters.py", line 504, in send raise ConnectionError(e, request=request) root@onap-vm-robot:/opt# curl -i -X POST http://10.110.208.162:35357/v2.0/tokens<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A35357_v2.0_tokens&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=U6uZbV_e1mMoChuqVQK09uimHVJxdECNGwMGv3torQ0&e=> -H "Content-type: application/json" -d '{"auth":{"passwordCredentials":{"username":"onap","password":"India@123"},"tenantId":"8c03c49a61e94955b5dae08bd312a8fd"}}' HTTP/1.1 200 OK Date: Fri, 08 Sep 2017 05:14:20 GMT Server: Apache/2.4.7 (Ubuntu) Vary: X-Auth-Token X-Distribution: Ubuntu x-openstack-request-id: req-3bb09a7d-5d5b-4a05-9ca5-25b961ed4cd6 Content-Length: 4219 Content-Type: application/json {"access": {"token": {"issued_at": "2017-09-08T05:14:20.000000Z", "expires": "2017-09-08T07:14:20Z", "id": "gAAAAABZsics021G-ekQEk8gqdI0ioAlAm0nqlVYYr28C1TSJiJHWxnJtwRcMcRmgKNgYKgB-XtsrTNGVJy0ousjQExHdu2toEl4NcSBWdLEkU1OvfHqmz93HDkCv2g45PfQWRozYK_VCff8Yk56jQOXUSwbY5phW_BJzK7JG6QyoxeH-7inBug", "tenant": {"description": "ONAP project", "enabled": true, "id": "8c03c49a61e94955b5dae08bd312a8fd", "name": "onaponvio"}, "audit_ids": ["3zPI-bmkQCeyyt5Y15PPtA"]}, "serviceCatalog": [{"endpoints": [{"adminURL": "http://10.110.208.162:8774/v2.1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8774_v2.1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=TRXF3mHGtmo7gmWyfx663R6pOxAQno8ItsUzdTT16Jo&e=>", "region": "nova", "id": "5dcfa1da83e24d04a3ebc38f7d9fc9b6", "internalURL": "http://10.110.208.162:8774/v2.1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8774_v2.1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=TRXF3mHGtmo7gmWyfx663R6pOxAQno8ItsUzdTT16Jo&e=>", "publicURL": "https://10.110.209.226:8774/v2.1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A8774_v2.1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=rJCtPb6FIXh-oWDzadw3lnJVC60hUY7bsfifj7elNRI&e=>"}], "endpoints_links": [], "type": "compute", "name": "nova"}, {"endpoints": [{"adminURL": "http://10.110.208.162:9696<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A9696&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=iiPsDeCu8V2JoC2eDw1xWpJEnZmMKnnoXp52SquN6d4&e=>", "region": "nova", "id": "4dec924ca80441aa848133295513e9a6", "internalURL": "http://10.110.208.162:9696<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A9696&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=iiPsDeCu8V2JoC2eDw1xWpJEnZmMKnnoXp52SquN6d4&e=>", "publicURL": "https://10.110.209.226:9696<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A9696&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=NU01EViquOS1GBWTwchZCjTl-1z3RlEXYGxScUQKwfE&e=>"}], "endpoints_links": [], "type": "network", "name": "neutron"}, {"endpoints": [{"adminURL": "http://10.110.208.162:8776/v2/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8776_v2_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=l9BILYHouhfi1OMJo7iCdSrs0o4j3YyXGlTOA7FShOY&e=>", "region": "nova", "id": "2261779188a8443cb3732104bdc837b9", "internalURL": "http://10.110.208.162:8776/v2/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8776_v2_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=l9BILYHouhfi1OMJo7iCdSrs0o4j3YyXGlTOA7FShOY&e=>", "publicURL": "https://10.110.209.226:8776/v2/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A8776_v2_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=SHNg86QWH10VH_jDL2XaAnpsC5DowI2JBpOpgjtNW1c&e=>"}], "endpoints_links": [], "type": "volumev2", "name": "cinderv2"}, {"endpoints": [{"adminURL": "http://10.110.208.162:8776/v3/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8776_v3_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=UaSS7U83EzUrSt7DFn_bfqRoknTdPdxON5AAngACz10&e=>", "region": "nova", "id": "2a0d1d0973de4a7d9161e6fd32a03641", "internalURL": "http://10.110.208.162:8776/v3/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8776_v3_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=UaSS7U83EzUrSt7DFn_bfqRoknTdPdxON5AAngACz10&e=>", "publicURL": "https://10.110.209.226:8776/v3/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A8776_v3_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=VVK8helC2RnWfZ1dx-KtmVnbyDmIqKTsZwIZ_KftU5A&e=>"}], "endpoints_links": [], "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"adminURL": "http://10.110.208.162:9292<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A9292&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=FeevZphWvK6VdE2v02j2lxQJQPsgfPeOwacZ9-EAsws&e=>", "region": "nova", "id": "46f9989219e44ac9a4eed4fe8dcc9a38", "internalURL": "http://10.110.208.162:9292<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A9292&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=FeevZphWvK6VdE2v02j2lxQJQPsgfPeOwacZ9-EAsws&e=>", "publicURL": "https://10.110.209.226:9292<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A9292&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=thAZO6UvOpyTFEIj3x_gy6wFvuM8PlhvDLCv2DPbEdc&e=>"}], "endpoints_links": [], "type": "image", "name": "glance"}, {"endpoints": [{"adminURL": "http://10.110.208.162:8774/v2/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8774_v2_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=4HHt-6-E_a8hIaAs2-w2VZU1EK8HbU6xa-YWVS_mNx8&e=>", "region": "nova", "id": "870768877a5f443cb4cd14c52fe678bf", "internalURL": "http://10.110.208.162:8774/v2/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8774_v2_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=4HHt-6-E_a8hIaAs2-w2VZU1EK8HbU6xa-YWVS_mNx8&e=>", "publicURL": "https://10.110.209.226:8774/v2/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A8774_v2_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=_G2WcJo4TNkyOLufz0ex9VHMY7txRT2Po7OcF5JRo48&e=>"}], "endpoints_links": [], "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"adminURL": "http://10.110.208.162:8000/v1<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8000_v1&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=gTNDU62m3B4lrILrFfdN7i4P4YNBxkwH5eOnyTHYmxI&e=>", "region": "nova", "id": "84877d5919514dfeb94c3307ca3849f8", "internalURL": "http://10.110.208.162:8000/v1<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8000_v1&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=gTNDU62m3B4lrILrFfdN7i4P4YNBxkwH5eOnyTHYmxI&e=>", "publicURL": "https://10.110.209.226:8000/v1<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A8000_v1&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=6Mk4kxZRMh8DmFGwH606pTdPYbOF72Iq_HF7u01ymIQ&e=>"}], "endpoints_links": [], "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"adminURL": "http://10.110.208.162:8776/v1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8776_v1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=KFyST1kq12iCovkB-rmUfwttmdvicBLjOiEEOuOvjQU&e=>", "region": "nova", "id": "0e91e2925f1d4768b162f4e1d38086c3", "internalURL": "http://10.110.208.162:8776/v1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8776_v1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=KFyST1kq12iCovkB-rmUfwttmdvicBLjOiEEOuOvjQU&e=>", "publicURL": "https://10.110.209.226:8776/v1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A8776_v1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=AjJxNU36xqWYd1r0yoC6XOzLVzY5Z_Hys44Gd8wL9xg&e=>"}], "endpoints_links": [], "type": "volume", "name": "cinder"}, {"endpoints": [{"adminURL": "http://10.110.208.162:8004/v1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8004_v1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=B2fbd4Kb_zq8pT6BNiNKi9mMPuXP7cK4xVrD9CBJtp8&e=>", "region": "nova", "id": "340425c96bed46baacc103afc31bfae2", "internalURL": "http://10.110.208.162:8004/v1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A8004_v1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=B2fbd4Kb_zq8pT6BNiNKi9mMPuXP7cK4xVrD9CBJtp8&e=>", "publicURL": "https://10.110.209.226:8004/v1/8c03c49a61e94955b5dae08bd312a8fd<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A8004_v1_8c03c49a61e94955b5dae08bd312a8fd&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=vAaVV27hKVI-b5KagVG4hW2k8o84k1acQ6VR1zwgowE&e=>"}], "endpoints_links": [], "type": "orchestration", "name": "heat"}, {"endpoints": [{"adminURL": "http://10.110.208.162:35357/v3<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A35357_v3&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=7kvopf9IO5qchD_PsG_N7g2tkzwbAQQSiLdr45eEMKA&e=>", "region": "nova", "id": "0e87e3753792463594d85e3f703e0d0c", "internalURL": "http://10.110.208.162:5000/v3<https://urldefense.proofpoint.com/v2/url?u=http-3A__10.110.208.162-3A5000_v3&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=PxLBKE9LzMqTi8_QZrhVDoPmR1oF6i4dhTNx33KbNRg&e=>", "publicURL": "https://10.110.209.226:5000/v3<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A5000_v3&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=VCqxmoXIn7gnVJDCMgaRFeykJVDm2yjo3xoASjghxUI&e=>"}], "endpoints_links": [], "type": "identity", "name": "keystone"}], "user": {"username": "onap", "roles_links": [], "id": "e95d8de88ffe4a7080ecc5558fd1e6ec", "roles": [{"name": "_member_"}, {"name": "heat_stack_owner"}, {"name": "admin"}], "name": "onap"}, "metadata": {"is_admin": 0, "roles": ["9fe2ff9ee4384b1894a90878d3e92bab", "116e93b02f6046aeac7d51b7d955286d", "2dc64934663b4082912367245416d794"]}}}root@onap-vm-robot:/opt# # Thanks Kapil From: PLATANIA, MARCO (MARCO) [mailto:plata...@research.att.com] Sent: 05 September 2017 22:01 To: ROSE, DANIEL V <dr6...@att.com<mailto:dr6...@att.com>>; Kapil Gupta (c) <gka...@vmware.com<mailto:gka...@vmware.com>>; onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org> Subject: Re: vFW demo setup issue Not familiar either, I don’t know what the Heat startup script is. If you refer to *_vm_install.sh script, we install libcurl4-openssl-dev, apt-transport-https, and ca-certificates in the vFW VMs. Try to install libcurl4-openssl-dev (if not already installed) in the Robot VM. Also, we use HTTP and not HTTPS for OpenStack, see output below: curl -i http://135.197.225.10:35357<https://urldefense.proofpoint.com/v2/url?u=http-3A__135.197.225.10-3A35357&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=HvekwPDNtOFAOQ9quKx8S5flvy5DFax50uFr-fvzBIU&e=> HTTP/1.1 300 Multiple Choices Date: Tue, 05 Sep 2017 16:19:58 GMT Server: Apache/2.4.7 (Ubuntu) Vary: X-Auth-Token X-Distribution: Ubuntu Content-Length: 599 Content-Type: application/json {"versions": {"values": [{"status": "stable", "updated": "2015-03-30T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.4", "links": [{"href": "http://135.197.225.10:35357/v3/<https://urldefense.proofpoint.com/v2/url?u=http-3A__135.197.225.10-3A35357_v3_&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=fbsRkVUTGbMOtCTcvvd1KLVZl7RGfeb4Fv-F2v-QlzI&e=>", "rel": "self"}]}, {"status": "stable", "updated": "2014-04-17T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v2.0+json"}], "id": "v2.0", "links": [{"href": "http://135.197.225.10:35357/v2.0/<https://urldefense.proofpoint.com/v2/url?u=http-3A__135.197.225.10-3A35357_v2.0_&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=bPo4swuS9i2G4TbUgLJf5IU_agaaSxX2EVmoyTO0e1M&e=>", "rel": "self"}, {"href": "http://docs.openstack.org/<https://urldefense.proofpoint.com/v2/url?u=http-3A__docs.openstack.org_&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=KgFIQiUJzSC0gUhJaQxg8eC3w16GC3sKgWIcs4iIee0&m=RbOgljHmTVWYqsc3FjLGxWfv_j00bvbQCdSh-hXk-CI&s=_qlEjlznW-ZCjUYHqDbdXUrE5eVeteaKl1-TlOi6PtA&e=>", "type": "text/html", "rel": "describedby"}]}]}} One last thing that comes to my mind: you are running python run –c from command line I suppose, and then ./demo.sh. I’m not sure whether the output of python run is visible in demo.sh. They should be 2 separate environments. Try to include python run in demo.sh. Thanks, Marco From: "ROSE, DANIEL V" <dr6...@att.com<mailto:dr6...@att.com>> Date: Tuesday, September 5, 2017 at 12:08 PM To: "Kapil Gupta (c)" <gka...@vmware.com<mailto:gka...@vmware.com>>, "onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org>" <onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org>>, "PLATANIA, MARCO (MARCO)" <plata...@research.att.com<mailto:plata...@research.att.com>> Subject: RE: vFW demo setup issue I am not too familiar with the way python handles ssl but I know for our demo we added a certificate in the heat startup script so maybe marco knows the best way to go about adding that? I have added him to the To Thanks, Daniel Rose ECOMP / ONAP com.att.ecomp 732-420-7308 From: Kapil Gupta (c) [mailto:gka...@vmware.com] Sent: Tuesday, September 05, 2017 12:07 PM To: ROSE, DANIEL V <dr6...@att.com<mailto:dr6...@att.com>>; onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org> Subject: RE: vFW demo setup issue Hi Daniel, Thanks for quick reply. We tried below step. However, it did not work for me. run python -c "import ssl; print(ssl.get_default_verify_paths())" output:- DefaultVerifyPaths(cafile=None, capath='/usr/lib/ssl/certs', openssl_cafile_env='SSL_CERT_FILE', openssl_cafile='/usr/lib/ssl/cert.pem', openssl_capath_env='SSL_CERT_DIR', openssl_capath='/usr/lib/ssl/certs') We found /etc/ssl/certs/ca-certificates.crt file also available at /usr/lib/ssl/certs/ Now try to run again “./demo.sh init” but still we have same error as before. Please let me know, if we need something more to fix. Thanks Kapil From: ROSE, DANIEL V [mailto:dr6...@att.com] Sent: 05 September 2017 19:31 To: Kapil Gupta (c) <gka...@vmware.com<mailto:gka...@vmware.com>>; onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org> Subject: RE: vFW demo setup issue If you want to use a custom certificate you need to have it added to the python ssl list. Try something like https://stackoverflow.com/questions/39356413/how-to-add-a-custom-ca-root-certificate-to-the-ca-store-used-by-python-in-window<https://urldefense.proofpoint.com/v2/url?u=https-3A__stackoverflow.com_questions_39356413_how-2Dto-2Dadd-2Da-2Dcustom-2Dca-2Droot-2Dcertificate-2Dto-2Dthe-2Dca-2Dstore-2Dused-2Dby-2Dpython-2Din-2Dwindow&d=DwMFAw&c=uilaK90D4TOVoH58JNXRgQ&r=KYd7-0nxrY2EiEpL_EoVwF2Zson1LwfrCKuuF-ewWPs&m=cYQ6g4q62N9-vGEWteZF7GqIksWIpseFPOf3Sb1_7AU&s=f-dC-NIfEqtAK8Uuu3s6j9PhmF6jGvI_RB92-zvoCYk&e=> Thanks, Daniel Rose ECOMP / ONAP com.att.ecomp 732-420-7308 From: onap-discuss-boun...@lists.onap.org<mailto:onap-discuss-boun...@lists.onap.org> [mailto:onap-discuss-boun...@lists.onap.org] On Behalf Of Kapil Gupta (c) Sent: Tuesday, September 05, 2017 9:36 AM To: onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org>; onap-discuss-boun...@lists.onap.org<mailto:onap-discuss-boun...@lists.onap.org> Subject: [onap-discuss] vFW demo setup issue Hi ALL, We are deploying vFW demo using below link. https://wiki.onap.org/display/DW/Tutorial%3A+Creating+a+Service+Instance+from+a+Design+Model<https://urldefense.proofpoint.com/v2/url?u=https-3A__wiki.onap.org_display_DW_Tutorial-253A-2BCreating-2Ba-2BService-2BInstance-2Bfrom-2Ba-2BDesign-2BModel&d=DwMFAw&c=LFYZ-o9_HUMeMTSQicvjIg&r=2wwdGZ3YcpSivQ2Kio028A&m=c3U5SN_--YgyN0iJGSXyMMgFkn_4Ma1tB4RZOtBH9h0&s=om5FoR7c4NEdBqUa8Ue6m04-aBdtFJza55b-X74wjSw&e=> We execute “./demo.sh init” from robot VM and stuck with certification error. root@onap-vm-robot:/opt# ./demo.sh init Initialize Customer And Models | FAIL | ConnectionError: HTTPSConnectionPool(host='10.110.209.226', port=5000): Max retries exceeded with url: /v2.0/tokens (Caused by SSLError(SSLError("bad handshake: Error([('SSL routines', 'tls_process_server_certificate', 'certificate verify failed')],)",),)) Curl response for keystone curl -i https://10.110.209.226:5000<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A5000&d=DwMFAw&c=LFYZ-o9_HUMeMTSQicvjIg&r=2wwdGZ3YcpSivQ2Kio028A&m=c3U5SN_--YgyN0iJGSXyMMgFkn_4Ma1tB4RZOtBH9h0&s=c8lGjQhFGTEB1PDk59At9TnWBgV3Pp839qmmyI4vrhc&e=> curl: (60) server certificate verification failed. CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none and response for curl -k https://10.110.209.226:5000<https://urldefense.proofpoint.com/v2/url?u=https-3A__10.110.209.226-3A5000&d=DwMFAw&c=LFYZ-o9_HUMeMTSQicvjIg&r=2wwdGZ3YcpSivQ2Kio028A&m=c3U5SN_--YgyN0iJGSXyMMgFkn_4Ma1tB4RZOtBH9h0&s=c8lGjQhFGTEB1PDk59At9TnWBgV3Pp839qmmyI4vrhc&e=> is good as it is “insecure" SSL. We checked path” : /etc/ssl/certs/ca-certificates.crt “ and found .crt file here. Please let us know how to move forward. Thanks Kapil ------------------------------------------------------------------------------ From: LUND, CARSTEN (CARSTEN) [mailto:l...@research.att.com] Sent: 04 September 2017 17:58 To: Kapil Gupta (c) <gka...@vmware.com<mailto:gka...@vmware.com>>; Gaurav Gupta (c) <guptagau...@vmware.com<mailto:guptagau...@vmware.com>>; PLATANIA, MARCO (MARCO) <plata...@research.att.com<mailto:plata...@research.att.com>>; Ran Pollak <ran.pol...@amdocs.com<mailto:ran.pol...@amdocs.com>>; Josef Reisinger <josef.reisin...@de.ibm.com<mailto:josef.reisin...@de.ibm.com>> Cc: onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org>; onap-discuss-boun...@lists.onap.org<mailto:onap-discuss-boun...@lists.onap.org> Subject: RE: [onap-discuss] Stabilized the ONAP master branch We should be fairly close. In fact this POSTGRES issue likely will not affect the demo use cases. I am a little supprised that docker-databus-controller is GREEN when vm-postgresql is not. The following should push configuration to postgres and fix the issue. root@a2ac83b5622f 11:: pwd /opt/app/dcae-controller-platform-server root@a2ac83b5622f 12:: bin/dcae-controller.sh configure-service-instance -i $ZONE -s vm-postgresql Carsten From: Kapil Gupta (c) [mailto:gka...@vmware.com] Sent: Monday, September 04, 2017 6:25 AM To: Gaurav Gupta (c) <guptagau...@vmware.com<mailto:guptagau...@vmware.com>>; PLATANIA, MARCO (MARCO) <plata...@research.att.com<mailto:plata...@research.att.com>>; Ran Pollak <ran.pol...@amdocs.com<mailto:ran.pol...@amdocs.com>>; LUND, CARSTEN (CARSTEN) <l...@research.att.com<mailto:l...@research.att.com>>; Josef Reisinger <josef.reisin...@de.ibm.com<mailto:josef.reisin...@de.ibm.com>> Cc: onap-discuss@lists.onap.org<mailto:onap-discuss@lists.onap.org>; onap-discuss-boun...@lists.onap.org<mailto:onap-discuss-boun...@lists.onap.org> Subject: RE: [onap-discuss] Stabilized the ONAP master branch Hi Marco , Carsten Thanks for your Input . I am Kapil from Gaurav’s team . We made some progress on the DCAE VM .But looks like we are still a little far from success. We have been successfully deploy all 5 DCAE additional VM's and their dockers. To check the status of DCAE deployment we executed DCAEDebug.sh (attached) and we found some error with POSTGRES VM. ======= reports ______________________________________________________________________________________________________________________________________________________________________________ | service | instance | name | dns | ip-assignment | state | public-ip | private-ip | ______________________________________________________________________________________________________________________________________________________________________________ | vm-cdap-cluster | NorthIndia | zldcNorthIndiaUPcdap00 | zldcNorthIndiaUPcdap00.dcae.simpledemo.openecomp.org | 10.110.208.231 | OPERATIONAL | 10.110.208.231 | 10.1.1.12 | | vm-cdap-cluster | NorthIndia | zldcNorthIndiaUPcdap01 | zldcNorthIndiaUPcdap01.dcae.simpledemo.openecomp.org | 10.110.208.232 | OPERATIONAL | 10.110.208.232 | 10.1.1.13 | | vm-cdap-cluster | NorthIndia | zldcNorthIndiaUPcdap02 | zldcNorthIndiaUPcdap02.dcae.simpledemo.openecomp.org | 10.110.208.233 | OPERATIONAL | 10.110.208.233 | 10.1.1.14 | | vm-controller | NorthIndia | zldcNorthIndiaUPcont00 | zldcNorthIndiaUPcont00.dcae.simpledemo.openecomp.org | NULL | OPERATIONAL | NULL | NULL | | vm-docker-host-1 | NorthIndia | zldcNorthIndiaUPcoll00 | zldcNorthIndiaUPcoll00.dcae.simpledemo.openecomp.org | 10.110.208.229 | OPERATIONAL | 10.110.208.229 | 10.1.1.10 | | vm-postgresql | NorthIndia | zldcNorthIndiaUPpstg00 | zldcNorthIndiaUPpstg00.dcae.simpledemo.openecomp.org | 10.110.208.230 | OPERATIONAL | 10.110.208.230 | 10.1.1.11 | ______________________________________________________________________________________________________________________________________________________________________________ null ___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ | service | instance | status | healthTestStatus | healthTestMessageCode | ___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ | cdap-helloworld | NorthIndia | DEPLOYED | GREEN | NULL | | cdap-tca-hi-lo | NorthIndia | DEPLOYED | GREEN | NULL | | docker-common-event | NorthIndia | DEPLOYED | GREEN | OK | | docker-databus-controller | NorthIndia | DEPLOYED | GREEN | &
_______________________________________________ onap-discuss mailing list onap-discuss@lists.onap.org https://lists.onap.org/mailman/listinfo/onap-discuss