Skip to content

Instantly share code, notes, and snippets.

Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,718 DEBUG [birncommunity.auth.authentication][MainThread] Storing OAuth credential in cache with key go.teragrid.orgmattias
Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,725 DEBUG [birncommunity.credentials.cache][MainThread] Storing credential with key go.teragrid.orgmattias
Sep 13 20:36:19 ip-10-101-65-225 uwsgi: [pid: 28183|app: 0|req: 6/7] 127.0.0.1 () {44 vars in 2315 bytes} [Tue Sep 13 20:36:17 2011] GET /authenticate_oauth_callback?oauth_token=teragrid:delegation,2011:/tempCred/f76ce58da5fa5b0818f41520037fdf0/1315946171314&oauth_verifier=teragrid:delegation,2011:/verifier/71a0ac9510826b07a5425ba1ea63f898/1315946177602 => generated 0 bytes in 2042 msecs (HTTP/1.0 302) 6 headers in 1011 bytes (1 switches on core 0)
Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity][MainThread] WEAVE BASE URL: https://oauth.globuscs.info
Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity.weave][MainThread] pr
Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,718 DEBUG [birncommunity.auth.authentication][MainThread] Storing OAuth credential in cache with key go.teragrid.orgmattias
Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,725 DEBUG [birncommunity.credentials.cache][MainThread] Storing credential with key go.teragrid.orgmattias
Sep 13 20:36:19 ip-10-101-65-225 uwsgi: [pid: 28183|app: 0|req: 6/7] 127.0.0.1 () {44 vars in 2315 bytes} [Tue Sep 13 20:36:17 2011] GET /authenticate_oauth_callback?oauth_token=teragrid:delegation,2011:/tempCred/f76ce58da5fa5b0818f41520037fdf0/1315946171314&oauth_verifier=teragrid:delegation,2011:/verifier/71a0ac9510826b07a5425ba1ea63f898/1315946177602 => generated 0 bytes in 2042 msecs (HTTP/1.0 302) 6 headers in 1011 bytes (1 switches on core 0)
Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity][MainThread] WEAVE BASE URL: https://oauth.globuscs.info
Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity.weave][MainThread] pr
[{"credential_type": "openid",
"openid": "mattias.lidman%40gmail.com",
"credential_key": "ee2f656f-242e-44f3-9954-4d5f7b65cab9",
"id_index": "mattias.lidman%40gmail.com",
"alias": "mattias-google",
"credential_path": "/users/mattias/credentials/openid/ee2f656f-242e-44f3-9954-4d5f7b65cab9",
"provider": "google.com",
"identity_url": "https%3A//www.google.com/accounts/o8/id%3Fid%3DAItOawmN77HU7ZK5J0cHJkp0vxxohlvTjr5q-uU",
"email": "mattias.lidman@gmail.com"},
<VirtualHost *:443>
SSLEngine On
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:!SSLv2:+EXP
SSLProtocol all -SSLv2
SSLCertificateFile /vagrant/cert-file.crt
SSLCertificateKeyFile /vagrant/server.key
SSLOptions +StdEnvVars
SetEnvIf User-Agent ".*MSIE.*" \
nokeepalive ssl-unclean-shutdown \
@mattias-lidman
mattias-lidman / gist:1170685
Created August 25, 2011 13:41
client.conf
<VirtualHost *:443 *:4569>
AddOutputFilterByType DEFLATE text/html text/plain text/xml application/javascript text/css
SSLEngine On
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:!SSLv2:+EXP
SSLProtocol all -SSLv2
SSLCertificateFile /vagrant/cert-file.crt
SSLCertificateKeyFile /vagrant/server.key
SSLOptions +StdEnvVars
@mattias-lidman
mattias-lidman / gist:1170683
Created August 25, 2011 13:40
default/000-default
<VirtualHost *:443>
SSLEngine On
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:!SSLv2:+EXP
SSLProtocol all -SSLv2
SSLCertificateFile /vagrant/cert-file.crt
SSLCertificateKeyFile /vagrant/server.key
SSLOptions +StdEnvVars
SetEnvIf User-Agent ".*MSIE.*" \
nokeepalive ssl-unclean-shutdown \
Vagrant::Config.run do |config|
# All Vagrant configuration is done here. For a detailed explanation
# and listing of configuration options, please view the documentation
# online.
# Every Vagrant virtual environment requires a box to build off of.
config.vm.box = "lucid32"
config.vm.forward_port("web", 80, 4567)
config.vm.forward_port("ssl", 443, 4569)
bash 'deploy .war' do
user 'root'
code <<EOF
cp /opt/shibboleth-idp/war/idp.war #{app['deploy_to']}/releases/#{app['war'][node.app_environment]['checksum']}.war
EOF
end
[default] Fixed port collision 'ssh'. Now on port 2200.
[default] Importing base box 'lucid32'...
[default] Destroying VM and associated drives...
../lib/vagrant_solo_databag_patch.rb:20:in `share_data_bag_folder': undefined method `folder_path' for #<Vagrant::Provisioners::ChefSolo:0x7fa95b204430> (NoMethodError)
from ../lib/vagrant_solo_databag_patch.rb:15:in `prepare'
from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/provision.rb:15:in `call'
from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/provision.rb:15:in `map'
from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/provision.rb:15:in `call'
from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/warden.rb:30:in `call'
from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/forward_ports.rb:92:in `call'
46 <<<<<<< HEAD
47 # leave this check to ensure we cover the migrated users with open id
48 try:
49 credential_id = create_credential_id(credential_type, params)
50 if _credential_exists_by_id(DataStoreManager().instance(), credential_type, credential_id):
51 return HTTPConflict("OpenID identity already exists")
52 except Exception:
53 message = json.dumps(error.create_error(message='Invalid %s credential' % credential_type))
54 log.exception(message)
55 return HTTPBadRequest(body=message)