This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,718 DEBUG [birncommunity.auth.authentication][MainThread] Storing OAuth credential in cache with key go.teragrid.orgmattias | |
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,725 DEBUG [birncommunity.credentials.cache][MainThread] Storing credential with key go.teragrid.orgmattias | |
| Sep 13 20:36:19 ip-10-101-65-225 uwsgi: [pid: 28183|app: 0|req: 6/7] 127.0.0.1 () {44 vars in 2315 bytes} [Tue Sep 13 20:36:17 2011] GET /authenticate_oauth_callback?oauth_token=teragrid:delegation,2011:/tempCred/f76ce58da5fa5b0818f41520037fdf0/1315946171314&oauth_verifier=teragrid:delegation,2011:/verifier/71a0ac9510826b07a5425ba1ea63f898/1315946177602 => generated 0 bytes in 2042 msecs (HTTP/1.0 302) 6 headers in 1011 bytes (1 switches on core 0) | |
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity][MainThread] WEAVE BASE URL: https://oauth.globuscs.info | |
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity.weave][MainThread] pr |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,718 DEBUG [birncommunity.auth.authentication][MainThread] Storing OAuth credential in cache with key go.teragrid.orgmattias | |
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,725 DEBUG [birncommunity.credentials.cache][MainThread] Storing credential with key go.teragrid.orgmattias | |
| Sep 13 20:36:19 ip-10-101-65-225 uwsgi: [pid: 28183|app: 0|req: 6/7] 127.0.0.1 () {44 vars in 2315 bytes} [Tue Sep 13 20:36:17 2011] GET /authenticate_oauth_callback?oauth_token=teragrid:delegation,2011:/tempCred/f76ce58da5fa5b0818f41520037fdf0/1315946171314&oauth_verifier=teragrid:delegation,2011:/verifier/71a0ac9510826b07a5425ba1ea63f898/1315946177602 => generated 0 bytes in 2042 msecs (HTTP/1.0 302) 6 headers in 1011 bytes (1 switches on core 0) | |
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity][MainThread] WEAVE BASE URL: https://oauth.globuscs.info | |
| Sep 13 20:36:19 ip-10-101-65-225 2011-09-13 20:36:19,755 DEBUG [birncommunity.weave][MainThread] pr |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [{"credential_type": "openid", | |
| "openid": "mattias.lidman%40gmail.com", | |
| "credential_key": "ee2f656f-242e-44f3-9954-4d5f7b65cab9", | |
| "id_index": "mattias.lidman%40gmail.com", | |
| "alias": "mattias-google", | |
| "credential_path": "/users/mattias/credentials/openid/ee2f656f-242e-44f3-9954-4d5f7b65cab9", | |
| "provider": "google.com", | |
| "identity_url": "https%3A//www.google.com/accounts/o8/id%3Fid%3DAItOawmN77HU7ZK5J0cHJkp0vxxohlvTjr5q-uU", | |
| "email": "mattias.lidman@gmail.com"}, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <VirtualHost *:443> | |
| SSLEngine On | |
| SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:!SSLv2:+EXP | |
| SSLProtocol all -SSLv2 | |
| SSLCertificateFile /vagrant/cert-file.crt | |
| SSLCertificateKeyFile /vagrant/server.key | |
| SSLOptions +StdEnvVars | |
| SetEnvIf User-Agent ".*MSIE.*" \ | |
| nokeepalive ssl-unclean-shutdown \ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <VirtualHost *:443 *:4569> | |
| AddOutputFilterByType DEFLATE text/html text/plain text/xml application/javascript text/css | |
| SSLEngine On | |
| SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:!SSLv2:+EXP | |
| SSLProtocol all -SSLv2 | |
| SSLCertificateFile /vagrant/cert-file.crt | |
| SSLCertificateKeyFile /vagrant/server.key | |
| SSLOptions +StdEnvVars |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <VirtualHost *:443> | |
| SSLEngine On | |
| SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:!SSLv2:+EXP | |
| SSLProtocol all -SSLv2 | |
| SSLCertificateFile /vagrant/cert-file.crt | |
| SSLCertificateKeyFile /vagrant/server.key | |
| SSLOptions +StdEnvVars | |
| SetEnvIf User-Agent ".*MSIE.*" \ | |
| nokeepalive ssl-unclean-shutdown \ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Vagrant::Config.run do |config| | |
| # All Vagrant configuration is done here. For a detailed explanation | |
| # and listing of configuration options, please view the documentation | |
| # online. | |
| # Every Vagrant virtual environment requires a box to build off of. | |
| config.vm.box = "lucid32" | |
| config.vm.forward_port("web", 80, 4567) | |
| config.vm.forward_port("ssl", 443, 4569) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| bash 'deploy .war' do | |
| user 'root' | |
| code <<EOF | |
| cp /opt/shibboleth-idp/war/idp.war #{app['deploy_to']}/releases/#{app['war'][node.app_environment]['checksum']}.war | |
| EOF | |
| end |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [default] Fixed port collision 'ssh'. Now on port 2200. | |
| [default] Importing base box 'lucid32'... | |
| [default] Destroying VM and associated drives... | |
| ../lib/vagrant_solo_databag_patch.rb:20:in `share_data_bag_folder': undefined method `folder_path' for #<Vagrant::Provisioners::ChefSolo:0x7fa95b204430> (NoMethodError) | |
| from ../lib/vagrant_solo_databag_patch.rb:15:in `prepare' | |
| from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/provision.rb:15:in `call' | |
| from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/provision.rb:15:in `map' | |
| from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/provision.rb:15:in `call' | |
| from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/warden.rb:30:in `call' | |
| from /usr/lib/ruby/gems/1.8/gems/vagrant-0.8.2/lib/vagrant/action/vm/forward_ports.rb:92:in `call' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 46 <<<<<<< HEAD | |
| 47 # leave this check to ensure we cover the migrated users with open id | |
| 48 try: | |
| 49 credential_id = create_credential_id(credential_type, params) | |
| 50 if _credential_exists_by_id(DataStoreManager().instance(), credential_type, credential_id): | |
| 51 return HTTPConflict("OpenID identity already exists") | |
| 52 except Exception: | |
| 53 message = json.dumps(error.create_error(message='Invalid %s credential' % credential_type)) | |
| 54 log.exception(message) | |
| 55 return HTTPBadRequest(body=message) |