cloudstack-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Alex Brett (JIRA)" <j...@apache.org>
Subject [jira] [Comment Edited] (CLOUDSTACK-7455) Unable to connect to management server ?since SAML2 merge?
Date Fri, 29 Aug 2014 16:47:54 GMT

    [ https://issues.apache.org/jira/browse/CLOUDSTACK-7455?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14115438#comment-14115438
] 

Alex Brett edited comment on CLOUDSTACK-7455 at 8/29/14 4:47 PM:
-----------------------------------------------------------------

Changes since the last good build I had (d9531fb0de6e59bfbb0ec2082558e3879b6e1668) -and the
one in the ticket (de6a3112b6b80952d1598acaa112ac50a3ef9d32)- and the first one I've seen
the problem on (b693e61fe665c98177f85aedb0b4b228f269c0b9) are:
{noformat}
commit b693e61fe665c98177f85aedb0b4b228f269c0b9
Author: amoghvk <amogh.vasekar@citrix.com>
Date:   Thu Aug 28 17:47:08 2014 -0700

    Temp fix for compilation issue, need to check what caused it

commit bea73e511e47e6543529d823f003a4dd998f7a49
Author: Jessica Wang <jessicawang@apache.org>
Date:   Thu Aug 28 16:17:00 2014 -0700

    CLOUDSTACK-7454: UI > zone wizard > Hyper-V > primary storage/secondary storage
> move SMB Domain field to be on top of SMB Username field.

commit 81608afee1318b2a283707ac9e6481f4f6629cc2
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 20:06:38 2014 +0200

    SAML2LoginAPIAuthenticatorCmdTest: Add missing license
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 97ed5ff636d922212e6ced91f6b1c41a9c9824d5
Merge: d9531fb 6eae9b8
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 19:57:25 2014 +0200

    Merge branch 'saml2'
    
    Implements CLOUDSTACK-7083
    
    Branch: saml2
    Proposal: http://markmail.org/message/4ba4ztmqpud3l4uo
    JIRA ticket: https://issues.apache.org/jira/browse/CLOUDSTACK-7083
    FS: https://cwiki.apache.org/confluence/display/CLOUDSTACK/SAML+2.0+Plugin
    Unit tests: Tests for each auth cmd class, SAMLUtils and SAMLAuthenticator, fixes unit
test for ApiServlet
    Build status: clean build works with unit tests, testing using mvn3.0.5 and jdk 1.7

commit 6eae9b859692417182103d06f5215fff11289942
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:47:08 2014 +0200

    saml: disable plugin by default and don't initiate if not enabled
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit aa02e30e9502d0bbb175a5367bce0282b035d5b6
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:40:51 2014 +0200

    saml: fix tests and update method signature that generates random certs
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 249446dc521a273fe14b3e9e49b397a363ef577d
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:40:05 2014 +0200

    server: add config to enable/disable SAML SSO/SLO plugin
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 5e7928bcb94be56fa3b9da68bc963d09bcace815
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:39:28 2014 +0200

    utils: fix static certificate value string in SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 0402f68b127df1ae7bdb0b299e462711db8d8030
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Tue Aug 26 23:06:17 2014 +0200

    SAML2LogoutAPIAuthenticatorCmd: if session is null, redirect to login page
    
    If session is null, probably logout (local) happened removing the name id and
    session index which is needed for global logout. The limitation by design is that
    local logout will void possibility of global logout. To globally logout, one
    use the SLO api which would logout locally as well.
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit de4e74b2b462773cb2866aa976e349e3f7151e9d
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 17:32:13 2014 +0200

    saml: Add unit tests for saml plugin
    
    - Fixes signatures on plugin manager for ease of testing
    - Fixes authenticator
    - Adds unit testing for getType and authenticate methods for all cmd classes
    - Adds SAMLAuthenticator test
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 1ed532fb2011b2a6f203cfa000df5466d7924f25
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 17:31:01 2014 +0200

    SAMLUtils: add unit test for SAMLUtils and method to randomly generate X509 certs
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 15fdc1744c42c0e70b3cde31ca4b163c7983bec2
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 02:41:26 2014 +0200

    SAML2LogoutAPIAuthenticatorCmd: check logout response and redirect to UI
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 3bf387c8828fdd388155704fd64f9bcd84bc3e7a
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 02:39:50 2014 +0200

    SAMLUtils: Create new NameID using passed nameId taking just id and session idx
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 8dc50927f9cfe994e2c2a828aedf77826f2599d9
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:58:24 2014 +0200

    saml: use SAML_RESPONSE from SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit ad13d3d7472bcb2361ba97914fa5c5c90b5429ca
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:57:24 2014 +0200

    SAML2UserAuthenticator: check that request params has SAMLResponse
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 7ee4176c7a8b3f552e48c00dbdb9858dc544c6b3
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:52:05 2014 +0200

    SAML2LogoutAPIAuthenticatorCmd: implement single log out
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b1946e8c13a04dbf262f0ee7cf94b55453b711cc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:51:16 2014 +0200

    SAML2LoginAPIAuthenticatorCmd: store nameid and session index in user's session
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 230e9705692705c5ec06d8f822c91892a4a026fc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:50:47 2014 +0200

    SAMLUtils: add logout request utility for saml slo
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b401828aef17b051fcc7874aee81201b305bb5b1
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:03:05 2014 +0200

    saml: use values from config for user account, domain and redirected url
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b0f3d66f9df597d4d96bd6966e6bfa533445f9ac
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:02:32 2014 +0200

    Config: add config for saml user account, domain and redirected URL to ACS UI
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2f6fa268f4fd97429224075f19e6314c38888ded
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:02:09 2014 +0200

    apidocs: add entry for getSPMetaData
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 8fa9d2c276309eba231a5bce8b68e525f72787d4
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 00:15:41 2014 +0200

    utils: fix SAMLUtils's authnrequest maker
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2a264cc7267f9dbb0b74e665274f200ec5ad9ab5
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 00:15:18 2014 +0200

    client: add getSPMetadata API in commands.properties
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit a13da8f9e0b0a693ef996810606154181ecbd568
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 00:13:32 2014 +0200

    saml2: Add GetServiceProviderMetaDataCmd that returns SP metadata XML
    
    This adds GetServiceProviderMetaDataCmd which returns SP metadata XML, since
    this information should be public for IdPs to discover, we implement this as a
    login/cmd api so this does not require any kind of authentication to GET this
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 7687b7311a9813a2c422e592e8ad1d50a4f8284e
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 20:48:25 2014 +0200

    saml: Implement logic to check response against X509 keys
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 47ccce85a12ef4932b67359e20c2fba7c192ff1c
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 20:47:43 2014 +0200

    api: add method to pass on api authenticators to cmd classes
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 8e6cb044801d151c5fd56eb03d8dbca22a976f39
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 20:46:20 2014 +0200

    SAMLUtils: leave bootstrapping to upper layers
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 0444bfb65350c71ddcdcd0c58968e4534ceb8a89
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 18:28:06 2014 +0200

    server: Add IDP entity ID config param
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 06e909923a604a348c9ff18380a868b96145c6e2
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:34:20 2014 +0200

    saml: Have the plugin use IDP metadata from URL, get values from Config
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 1b0f81ec6f13ce967908049a4bb5bba0cd0a08d9
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:33:45 2014 +0200

    utils: Remove hard coded strings from SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 5d94fd5be51384e878e84af5618b51ac5b30a8f1
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:33:20 2014 +0200

    server: Add SAML related config params in Config
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 37961ebdd8690075c39925476c12c705388a4014
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:32:56 2014 +0200

    saml: Implement SAML2AuthManager interface
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 37d696db80fd521b7ddc9b958cb5205c496e75bc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 16:03:21 2014 +0200

    ApiServer: Fix imports order, use org.apache.cloudstack.api.ApiServerService
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit d45b303569af77c3c8c673bfb47ad6fdf21a8cbc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 16:01:22 2014 +0200

    saml2: Fix plugin after refactoring
    
    - Use opensaml version from root pom
    - Add utils and api as explicit dependency
    - Add org.apache.cloudstack.saml.SAML2AuthServiceImpl bean
    - Fix imports in all source files and resource xmls
    - Use methods available from SAMLUtils to encode/decode SAML request/response
    - SAML logout api is not the global logout api
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 591a686d77b93675fcfa0c7940bddd02a389dffd
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:59:10 2014 +0200

    server: fix server package after auth plugin refactor
    
    - Have opensaml dependency to get version from root pom
    - add com.cloud.api.auth.APIAuthenticationManagerImpl to spring ctx manager
    - Fix getCommands() in APIAuthenticationManagerImpl
    - Fix imports in resources, test and src classes
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 4422fdd9ad359f29848de304b92b5fd3b214cb28
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:56:10 2014 +0200

    saml2: Implement SAML2AuthServiceImpl which is a PluggableAPIAuthenticator
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 47c90508712e7bc6a9dfed7c53ebc0b0ccd27696
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:54:55 2014 +0200

    core: Add registry and beans in spring registry for PluggableAPIAuthenticator
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 7ff50499a1b2eb42beeea021d850d5bf5a726571
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:53:53 2014 +0200

    api: Add PluggableAPIAuthenticator interface
    
    This interface is used by any plugin for implementing a pluggable API
    authenticator such as SAML, OAuth etc.
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 74f57959085c170fe18808b9da9eac2a1cb22d78
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:52:55 2014 +0200

    api: fix refactored ApiServerService interface to api
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 68e094ebaf6ce0c3280c9b6c191f1c389758e8f9
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:51:29 2014 +0200

    saml: move refactor files from server to api module
    
    - Move interfaces and classes from server to api module
    - This can be then used for pluggable api authenticators
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit c04b9ed661f38ab47825e5bfdc12b0a59d97fc92
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:50:40 2014 +0200

    Maven: add opensaml 2.6.1 version id in pom.xml
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit d6ea4ad7e064eea23e584be44d10a8c4ee80b608
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:50:07 2014 +0200

    utils: refactor and aggregate methods in SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit e6ec51e12a317a6594b9acdef8dc1ca990be1867
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:56:54 2014 +0200

    ui: refactor and use a unified unboxing helping method in cloudStack.js
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit a364054db60e1a91c5fb671616783b1db9deb590
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:31:46 2014 +0200

    Minor fixes
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2464e02bf45515c6b642b3a3a3fd62045d48ab74
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:20:54 2014 +0200

    SAML2LoginAPIAuthenticatorCmd: Set all necessary cookies and redirect to UI
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 9b1a6dac4a4bb766ee050040356998776ddca190
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:20:03 2014 +0200

    ui: Unbox extra quotes from sessionKey cookie value
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2694ad7bd91671629831f9feede879cb24d05d69
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:50:18 2014 +0200

    ApiServlet: Fix NPE while inserting to auditTrail
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit a1dc9e8189ebdab3f7e8b849f1777f282a7a295b
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:43:58 2014 +0200

    SAML2LoginAPIAuthenticatorCmd: Implement SAML SSO using HTTP Redirect binding
    
    - Creates SAMLRequest and uses HTTP redirect binding (uses GET/302)
    - Redirects to IdP for auth
    - On successful auth, check for assertion
    - Tries to get attributes based on standard LDAP attribute names
    - Next, gets user using EntityManager, if not found creates one with NameID as UUID
    - Finally tries to log in and redirect
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 9c7204d38637f046768541a3dc3aa707fe5eb927
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:43:37 2014 +0200

    DefaultLoginAPIAuthenticatorCmd: move createLoginResponse to ApiServer
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 1a3813a342ebaf454387475585a9f427c4540d1f
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:35:11 2014 +0200

    ApiServer: change loginUser method signature to return ResponseObject
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b82207e081b79261a274058cdd0323aff9c3be46
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 17 19:12:00 2014 +0200

    SAML: WIP redirections work now
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 18ff47efc046c134592461938b87f560762c11b8
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 17 19:11:40 2014 +0200

    server: add opensaml as dependency
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit df95a762f4a5ca7671995cf035223ab90790174a
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Tue Aug 12 13:10:05 2014 +0200

    SAML2: add saml sso and slo apicmds skeleton, add classes to AuthManager
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
{noformat}

Updated to eliminate two changes as I've identified I had used an intermediate build that
had the same issue...


was (Author: alexbre):
Changes since the last good build I had (d9531fb0de6e59bfbb0ec2082558e3879b6e1668) and the
one in the ticket (de6a3112b6b80952d1598acaa112ac50a3ef9d32) are:
{noformat}
commit de6a3112b6b80952d1598acaa112ac50a3ef9d32
Author: Mike Tutkowski <mike.tutkowski@solidfire.com>
Date:   Thu Aug 28 23:19:04 2014 -0600

    Update to volume-resize logic

commit 0e79cd1172e4340b957b0328354761e8a9305609
Author: Mike Tutkowski <mike.tutkowski@solidfire.com>
Date:   Thu Aug 28 23:14:42 2014 -0600

    Minor changes to SolidFire automation-related code

commit b693e61fe665c98177f85aedb0b4b228f269c0b9
Author: amoghvk <amogh.vasekar@citrix.com>
Date:   Thu Aug 28 17:47:08 2014 -0700

    Temp fix for compilation issue, need to check what caused it

commit bea73e511e47e6543529d823f003a4dd998f7a49
Author: Jessica Wang <jessicawang@apache.org>
Date:   Thu Aug 28 16:17:00 2014 -0700

    CLOUDSTACK-7454: UI > zone wizard > Hyper-V > primary storage/secondary storage
> move SMB Domain field to be on top of SMB Username field.

commit 81608afee1318b2a283707ac9e6481f4f6629cc2
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 20:06:38 2014 +0200

    SAML2LoginAPIAuthenticatorCmdTest: Add missing license
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 97ed5ff636d922212e6ced91f6b1c41a9c9824d5
Merge: d9531fb 6eae9b8
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 19:57:25 2014 +0200

    Merge branch 'saml2'
    
    Implements CLOUDSTACK-7083
    
    Branch: saml2
    Proposal: http://markmail.org/message/4ba4ztmqpud3l4uo
    JIRA ticket: https://issues.apache.org/jira/browse/CLOUDSTACK-7083
    FS: https://cwiki.apache.org/confluence/display/CLOUDSTACK/SAML+2.0+Plugin
    Unit tests: Tests for each auth cmd class, SAMLUtils and SAMLAuthenticator, fixes unit
test for ApiServlet
    Build status: clean build works with unit tests, testing using mvn3.0.5 and jdk 1.7

commit 6eae9b859692417182103d06f5215fff11289942
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:47:08 2014 +0200

    saml: disable plugin by default and don't initiate if not enabled
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit aa02e30e9502d0bbb175a5367bce0282b035d5b6
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:40:51 2014 +0200

    saml: fix tests and update method signature that generates random certs
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 249446dc521a273fe14b3e9e49b397a363ef577d
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:40:05 2014 +0200

    server: add config to enable/disable SAML SSO/SLO plugin
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 5e7928bcb94be56fa3b9da68bc963d09bcace815
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Thu Aug 28 18:39:28 2014 +0200

    utils: fix static certificate value string in SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 0402f68b127df1ae7bdb0b299e462711db8d8030
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Tue Aug 26 23:06:17 2014 +0200

    SAML2LogoutAPIAuthenticatorCmd: if session is null, redirect to login page
    
    If session is null, probably logout (local) happened removing the name id and
    session index which is needed for global logout. The limitation by design is that
    local logout will void possibility of global logout. To globally logout, one
    use the SLO api which would logout locally as well.
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit de4e74b2b462773cb2866aa976e349e3f7151e9d
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 17:32:13 2014 +0200

    saml: Add unit tests for saml plugin
    
    - Fixes signatures on plugin manager for ease of testing
    - Fixes authenticator
    - Adds unit testing for getType and authenticate methods for all cmd classes
    - Adds SAMLAuthenticator test
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 1ed532fb2011b2a6f203cfa000df5466d7924f25
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 17:31:01 2014 +0200

    SAMLUtils: add unit test for SAMLUtils and method to randomly generate X509 certs
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 15fdc1744c42c0e70b3cde31ca4b163c7983bec2
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 02:41:26 2014 +0200

    SAML2LogoutAPIAuthenticatorCmd: check logout response and redirect to UI
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 3bf387c8828fdd388155704fd64f9bcd84bc3e7a
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 02:39:50 2014 +0200

    SAMLUtils: Create new NameID using passed nameId taking just id and session idx
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 8dc50927f9cfe994e2c2a828aedf77826f2599d9
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:58:24 2014 +0200

    saml: use SAML_RESPONSE from SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit ad13d3d7472bcb2361ba97914fa5c5c90b5429ca
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:57:24 2014 +0200

    SAML2UserAuthenticator: check that request params has SAMLResponse
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 7ee4176c7a8b3f552e48c00dbdb9858dc544c6b3
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:52:05 2014 +0200

    SAML2LogoutAPIAuthenticatorCmd: implement single log out
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b1946e8c13a04dbf262f0ee7cf94b55453b711cc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:51:16 2014 +0200

    SAML2LoginAPIAuthenticatorCmd: store nameid and session index in user's session
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 230e9705692705c5ec06d8f822c91892a4a026fc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:50:47 2014 +0200

    SAMLUtils: add logout request utility for saml slo
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b401828aef17b051fcc7874aee81201b305bb5b1
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:03:05 2014 +0200

    saml: use values from config for user account, domain and redirected url
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b0f3d66f9df597d4d96bd6966e6bfa533445f9ac
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:02:32 2014 +0200

    Config: add config for saml user account, domain and redirected URL to ACS UI
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2f6fa268f4fd97429224075f19e6314c38888ded
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 01:02:09 2014 +0200

    apidocs: add entry for getSPMetaData
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 8fa9d2c276309eba231a5bce8b68e525f72787d4
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 00:15:41 2014 +0200

    utils: fix SAMLUtils's authnrequest maker
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2a264cc7267f9dbb0b74e665274f200ec5ad9ab5
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 00:15:18 2014 +0200

    client: add getSPMetadata API in commands.properties
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit a13da8f9e0b0a693ef996810606154181ecbd568
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 25 00:13:32 2014 +0200

    saml2: Add GetServiceProviderMetaDataCmd that returns SP metadata XML
    
    This adds GetServiceProviderMetaDataCmd which returns SP metadata XML, since
    this information should be public for IdPs to discover, we implement this as a
    login/cmd api so this does not require any kind of authentication to GET this
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 7687b7311a9813a2c422e592e8ad1d50a4f8284e
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 20:48:25 2014 +0200

    saml: Implement logic to check response against X509 keys
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 47ccce85a12ef4932b67359e20c2fba7c192ff1c
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 20:47:43 2014 +0200

    api: add method to pass on api authenticators to cmd classes
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 8e6cb044801d151c5fd56eb03d8dbca22a976f39
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 20:46:20 2014 +0200

    SAMLUtils: leave bootstrapping to upper layers
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 0444bfb65350c71ddcdcd0c58968e4534ceb8a89
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 18:28:06 2014 +0200

    server: Add IDP entity ID config param
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 06e909923a604a348c9ff18380a868b96145c6e2
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:34:20 2014 +0200

    saml: Have the plugin use IDP metadata from URL, get values from Config
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 1b0f81ec6f13ce967908049a4bb5bba0cd0a08d9
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:33:45 2014 +0200

    utils: Remove hard coded strings from SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 5d94fd5be51384e878e84af5618b51ac5b30a8f1
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:33:20 2014 +0200

    server: Add SAML related config params in Config
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 37961ebdd8690075c39925476c12c705388a4014
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 17:32:56 2014 +0200

    saml: Implement SAML2AuthManager interface
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 37d696db80fd521b7ddc9b958cb5205c496e75bc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 16:03:21 2014 +0200

    ApiServer: Fix imports order, use org.apache.cloudstack.api.ApiServerService
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit d45b303569af77c3c8c673bfb47ad6fdf21a8cbc
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 16:01:22 2014 +0200

    saml2: Fix plugin after refactoring
    
    - Use opensaml version from root pom
    - Add utils and api as explicit dependency
    - Add org.apache.cloudstack.saml.SAML2AuthServiceImpl bean
    - Fix imports in all source files and resource xmls
    - Use methods available from SAMLUtils to encode/decode SAML request/response
    - SAML logout api is not the global logout api
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 591a686d77b93675fcfa0c7940bddd02a389dffd
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:59:10 2014 +0200

    server: fix server package after auth plugin refactor
    
    - Have opensaml dependency to get version from root pom
    - add com.cloud.api.auth.APIAuthenticationManagerImpl to spring ctx manager
    - Fix getCommands() in APIAuthenticationManagerImpl
    - Fix imports in resources, test and src classes
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 4422fdd9ad359f29848de304b92b5fd3b214cb28
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:56:10 2014 +0200

    saml2: Implement SAML2AuthServiceImpl which is a PluggableAPIAuthenticator
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 47c90508712e7bc6a9dfed7c53ebc0b0ccd27696
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:54:55 2014 +0200

    core: Add registry and beans in spring registry for PluggableAPIAuthenticator
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 7ff50499a1b2eb42beeea021d850d5bf5a726571
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:53:53 2014 +0200

    api: Add PluggableAPIAuthenticator interface
    
    This interface is used by any plugin for implementing a pluggable API
    authenticator such as SAML, OAuth etc.
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 74f57959085c170fe18808b9da9eac2a1cb22d78
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:52:55 2014 +0200

    api: fix refactored ApiServerService interface to api
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 68e094ebaf6ce0c3280c9b6c191f1c389758e8f9
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:51:29 2014 +0200

    saml: move refactor files from server to api module
    
    - Move interfaces and classes from server to api module
    - This can be then used for pluggable api authenticators
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit c04b9ed661f38ab47825e5bfdc12b0a59d97fc92
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:50:40 2014 +0200

    Maven: add opensaml 2.6.1 version id in pom.xml
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit d6ea4ad7e064eea23e584be44d10a8c4ee80b608
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 24 15:50:07 2014 +0200

    utils: refactor and aggregate methods in SAMLUtils
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit e6ec51e12a317a6594b9acdef8dc1ca990be1867
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:56:54 2014 +0200

    ui: refactor and use a unified unboxing helping method in cloudStack.js
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit a364054db60e1a91c5fb671616783b1db9deb590
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:31:46 2014 +0200

    Minor fixes
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2464e02bf45515c6b642b3a3a3fd62045d48ab74
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:20:54 2014 +0200

    SAML2LoginAPIAuthenticatorCmd: Set all necessary cookies and redirect to UI
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 9b1a6dac4a4bb766ee050040356998776ddca190
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 04:20:03 2014 +0200

    ui: Unbox extra quotes from sessionKey cookie value
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 2694ad7bd91671629831f9feede879cb24d05d69
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:50:18 2014 +0200

    ApiServlet: Fix NPE while inserting to auditTrail
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit a1dc9e8189ebdab3f7e8b849f1777f282a7a295b
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:43:58 2014 +0200

    SAML2LoginAPIAuthenticatorCmd: Implement SAML SSO using HTTP Redirect binding
    
    - Creates SAMLRequest and uses HTTP redirect binding (uses GET/302)
    - Redirects to IdP for auth
    - On successful auth, check for assertion
    - Tries to get attributes based on standard LDAP attribute names
    - Next, gets user using EntityManager, if not found creates one with NameID as UUID
    - Finally tries to log in and redirect
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 9c7204d38637f046768541a3dc3aa707fe5eb927
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:43:37 2014 +0200

    DefaultLoginAPIAuthenticatorCmd: move createLoginResponse to ApiServer
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 1a3813a342ebaf454387475585a9f427c4540d1f
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Mon Aug 18 03:35:11 2014 +0200

    ApiServer: change loginUser method signature to return ResponseObject
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit b82207e081b79261a274058cdd0323aff9c3be46
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 17 19:12:00 2014 +0200

    SAML: WIP redirections work now
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit 18ff47efc046c134592461938b87f560762c11b8
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Sun Aug 17 19:11:40 2014 +0200

    server: add opensaml as dependency
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

commit df95a762f4a5ca7671995cf035223ab90790174a
Author: Rohit Yadav <rohit.yadav@shapeblue.com>
Date:   Tue Aug 12 13:10:05 2014 +0200

    SAML2: add saml sso and slo apicmds skeleton, add classes to AuthManager
    
    Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>
{noformat}

> Unable to connect to management server ?since SAML2 merge?
> ----------------------------------------------------------
>
>                 Key: CLOUDSTACK-7455
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-7455
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the default.) 
>          Components: Management Server
>    Affects Versions: 4.5.0
>            Reporter: Alex Brett
>            Priority: Blocker
>             Fix For: 4.5.0
>
>         Attachments: management-server.log
>
>
> In builds that have the SAML2 merge in, while I can start the management server, it appears
not to fully startup, and doesn't give the UI or API.
> management-server.log (attached) stops at:
> {noformat}
> 2014-08-29 14:55:02,097 INFO  [o.a.c.s.l.CloudStackExtendedLifeCycle] (main:null) Starting
CloudStack Components
> 2014-08-29 14:55:02,098 INFO  [o.a.c.s.l.CloudStackExtendedLifeCycle] (main:null) Done
Starting CloudStack Components
> 2014-08-29 14:55:02,098 INFO  [o.a.c.s.m.m.i.DefaultModuleDefinitionSet] (main:null)
Starting module [core]
> 2014-08-29 14:55:02,098 INFO  [o.a.c.s.l.CloudStackExtendedLifeCycle] (main:null) Starting
CloudStack Components
> 2014-08-29 14:55:02,106 INFO  [c.c.h.h.m.HypervManagerImpl] (main:null) Cleanup mounted
mount points used in previous session
> 2014-08-29 14:55:02,141 INFO  [c.c.u.DatabaseIntegrityChecker] (main:null) Grabbing lock
to check for database integrity.
> 2014-08-29 14:55:02,143 INFO  [c.c.u.DatabaseIntegrityChecker] (main:null) Performing
database integrity check
> 2014-08-29 14:55:02,144 DEBUG [c.c.u.DatabaseIntegrityChecker] (main:null) No duplicate
hosts with the same local storage found in database
> 2014-08-29 14:55:02,146 DEBUG [c.c.u.d.VersionDaoImpl] (main:null) Checking to see if
the database is at a version before it was the version table is created
> 2014-08-29 14:55:02,150 INFO  [c.c.c.ClusterManagerImpl] (main:null) Starting Cluster
manager, msid : 99326614648649
> 2014-08-29 14:55:02,155 INFO  [c.c.c.ClusterManagerImpl] (main:null) Management server
99326614648649, runId 1409324073632 is being started
> 2014-08-29 14:55:02,156 INFO  [c.c.c.ClusterManagerImpl] (main:null) Management server
(host id : 1) is being started at 127.0.0.1:9090
> 2014-08-29 14:55:02,162 INFO  [c.c.c.ClusterManagerImpl] (main:null) Cluster manager
was started successfully
> 2014-08-29 14:55:02,167 DEBUG [c.c.u.s.Script] (main:null) Executing: /bin/bash -c /sbin/route
| grep default 
> 2014-08-29 14:55:02,183 DEBUG [c.c.u.s.Script] (main:null) Execution is successful.
> 2014-08-29 14:55:02,185 WARN  [c.c.c.ConfigurationManagerImpl] (main:null) Management
network CIDR is not configured originally. Set it default to 10.220.128.0/19
> 2014-08-29 14:55:02,190 WARN  [o.a.c.alerts] (main:null)  alertType:: 14 // dataCenterId::
0 // podId:: 0 // clusterId:: null // message:: Management network CIDR is not configured
originally. Set it default to 10.220.128.0/19
> 2014-08-29 14:55:02,215 INFO  [c.c.h.HighAvailabilityManagerImpl] (HA-Worker-0:null)
Starting work
> 2014-08-29 14:55:02,224 INFO  [c.c.h.HighAvailabilityManagerImpl] (HA-Worker-3:null)
Starting work
> 2014-08-29 14:55:02,224 INFO  [c.c.h.HighAvailabilityManagerImpl] (HA-Worker-4:null)
Starting work
> 2014-08-29 14:55:02,218 INFO  [c.c.h.HighAvailabilityManagerImpl] (HA-Worker-2:null)
Starting work
> 2014-08-29 14:55:02,218 INFO  [c.c.h.HighAvailabilityManagerImpl] (HA-Worker-1:null)
Starting work
> 2014-08-29 14:55:02,290 DEBUG [c.c.n.l.LBHealthCheckManagerImpl] (main:null) LB HealthCheckmanager
is getting Started
> 2014-08-29 14:55:02,307 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (NetworkStatsUpdater-1:ctx-5b259b22)
Successfully updated aggregate network stats
> 2014-08-29 14:55:11,061 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.CloudStackAccountDaoImpl_EnhancerByCloudStack_156f5045
> 2014-08-29 14:55:11,066 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.OfferingDaoImpl_EnhancerByCloudStack_aa79bf9f
> 2014-08-29 14:55:11,066 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.SMetaDaoImpl_EnhancerByCloudStack_c720af97
> 2014-08-29 14:55:11,066 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.MultipartMetaDaoImpl_EnhancerByCloudStack_ae893256
> 2014-08-29 14:55:11,067 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.UserCredentialsDaoImpl_EnhancerByCloudStack_68227ab6
> 2014-08-29 14:55:11,067 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.CloudStackConfigurationDaoImpl_EnhancerByCloudStack_d654c274
> 2014-08-29 14:55:11,067 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.BucketPolicyDaoImpl_EnhancerByCloudStack_2def2c39
> 2014-08-29 14:55:11,067 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.SObjectItemDaoImpl_EnhancerByCloudStack_1201e402
> 2014-08-29 14:55:11,067 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.MHostMountDaoImpl_EnhancerByCloudStack_67051811
> 2014-08-29 14:55:11,068 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.MHostDaoImpl_EnhancerByCloudStack_d8ed3a52
> 2014-08-29 14:55:11,068 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.MultiPartUploadsDaoImpl_EnhancerByCloudStack_9461df7f
> 2014-08-29 14:55:11,068 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.SBucketDaoImpl_EnhancerByCloudStack_659e1c4a
> 2014-08-29 14:55:11,068 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.SAclDaoImpl_EnhancerByCloudStack_d88cf4c6
> 2014-08-29 14:55:11,069 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.MultiPartPartsDaoImpl_EnhancerByCloudStack_605c0a01
> 2014-08-29 14:55:11,069 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.CloudStackSvcOfferingDaoImpl_EnhancerByCloudStack_5fb1f664
> 2014-08-29 14:55:11,069 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.SHostDaoImpl_EnhancerByCloudStack_17fb09c
> 2014-08-29 14:55:11,069 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.CloudStackUserDaoImpl_EnhancerByCloudStack_e3a8a5e7
> 2014-08-29 14:55:11,069 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.persist.dao.SObjectDaoImpl_EnhancerByCloudStack_e85a208d
> 2014-08-29 14:55:11,070 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.service.core.ec2.EC2Engine_EnhancerByCloudStack_3ae7053d
> 2014-08-29 14:55:11,168 INFO  [c.c.u.c.ComponentContext] (main:null) Configuring com.cloud.bridge.service.controller.s3.ServiceProvider_EnhancerByCloudStack_66179fb2
> 2014-08-29 14:55:11,269 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.CloudStackAccountDaoImpl_EnhancerByCloudStack_156f5045
> 2014-08-29 14:55:11,269 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.OfferingDaoImpl_EnhancerByCloudStack_aa79bf9f
> 2014-08-29 14:55:11,269 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.SMetaDaoImpl_EnhancerByCloudStack_c720af97
> 2014-08-29 14:55:11,269 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.MultipartMetaDaoImpl_EnhancerByCloudStack_ae893256
> 2014-08-29 14:55:11,269 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.UserCredentialsDaoImpl_EnhancerByCloudStack_68227ab6
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.CloudStackConfigurationDaoImpl_EnhancerByCloudStack_d654c274
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.BucketPolicyDaoImpl_EnhancerByCloudStack_2def2c39
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.SObjectItemDaoImpl_EnhancerByCloudStack_1201e402
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.MHostMountDaoImpl_EnhancerByCloudStack_67051811
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.MHostDaoImpl_EnhancerByCloudStack_d8ed3a52
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.MultiPartUploadsDaoImpl_EnhancerByCloudStack_9461df7f
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.SBucketDaoImpl_EnhancerByCloudStack_659e1c4a
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.SAclDaoImpl_EnhancerByCloudStack_d88cf4c6
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.MultiPartPartsDaoImpl_EnhancerByCloudStack_605c0a01
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.CloudStackSvcOfferingDaoImpl_EnhancerByCloudStack_5fb1f664
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.SHostDaoImpl_EnhancerByCloudStack_17fb09c
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.CloudStackUserDaoImpl_EnhancerByCloudStack_e3a8a5e7
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.persist.dao.SObjectDaoImpl_EnhancerByCloudStack_e85a208d
> 2014-08-29 14:55:11,270 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.service.core.ec2.EC2Engine_EnhancerByCloudStack_3ae7053d
> 2014-08-29 14:55:11,271 INFO  [c.c.u.c.ComponentContext] (main:null) Starting com.cloud.bridge.service.controller.s3.ServiceProvider_EnhancerByCloudStack_66179fb2
> {noformat}
> Whereas on a working setup on an older build I see additional content after this, such
as:
> {noformat}
> 2014-08-27 16:27:20,980 DEBUG [c.c.s.StatsCollector] (StatsCollector-1:ctx-564c3835)
HostStatsCollector is running...
> 2014-08-27 16:27:20,987 DEBUG [c.c.s.StatsCollector] (StatsCollector-2:ctx-1da88554)
VmStatsCollector is running...
> 2014-08-27 16:27:20,988 DEBUG [c.c.s.StatsCollector] (StatsCollector-3:ctx-e0dd501a)
StorageCollector is running...
> 2014-08-27 16:27:20,987 DEBUG [c.c.s.StatsCollector] (StatsCollector-4:ctx-506c5f32)
AutoScaling Monitor is running...
> 2014-08-27 16:27:35,893 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-f12f2df6)
Found 0 routers to update status. 
> 2014-08-27 16:27:35,895 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-f12f2df6)
Found 0 networks to update RvR status. 
> 2014-08-27 16:27:36,012 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Running Capacity Checker ... 
> 2014-08-27 16:27:36,012 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
recalculating system capacity
> 2014-08-27 16:27:36,012 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Executing cpu/ram capacity update
> 2014-08-27 16:27:36,016 DEBUG [c.c.d.DeploymentPlanningManagerImpl] (HostReservationReleaseChecker:ctx-39dd69cc)
Checking if any host reservation can be released ... 
> 2014-08-27 16:27:36,017 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Done executing cpu/ram capacity update
> 2014-08-27 16:27:36,017 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Executing storage capacity update
> 2014-08-27 16:27:36,018 DEBUG [c.c.d.DeploymentPlanningManagerImpl] (HostReservationReleaseChecker:ctx-39dd69cc)
Done running HostReservationReleaseChecker ... 
> 2014-08-27 16:27:36,018 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Done executing storage capacity update
> 2014-08-27 16:27:36,018 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Executing capacity updates for public ip and Vlans
> 2014-08-27 16:27:36,019 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Done capacity updates for public ip and Vlans
> 2014-08-27 16:27:36,019 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Executing capacity updates for private ip
> 2014-08-27 16:27:36,019 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Done executing capacity updates for private ip
> 2014-08-27 16:27:36,020 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Done recalculating system capacity
> 2014-08-27 16:27:36,021 DEBUG [c.c.a.AlertManagerImpl] (CapacityChecker:ctx-769b4449)
Done running Capacity Checker ... 
> 2014-08-27 16:27:47,577 DEBUG [c.c.c.ConsoleProxyManagerImpl] (consoleproxy-1:ctx-c3884b29)
Skip capacity scan due to there is no Primary Storage UPintenance mode
> 2014-08-27 16:28:05,890 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-7d67099e)
Found 0 routers to update status. 
> 2014-08-27 16:28:05,892 DEBUG [c.c.n.r.VirtualNetworkApplianceManagerImpl] (RouterStatusMonitor-1:ctx-7d67099e)
Found 0 networks to update RvR status. 
> {noformat}
> This is on a management server installed from http://jenkins.buildacloud.org/job/package-rhel63-master/3202/
> I can't say categorically it's the SAML2 changes, as there are a couple of other bits
and pieces that have gone in since the last working build (I'm attempting to get the commit
identified now)...



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Mime
View raw message