Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 16:09:05 01/11/19 Removed ./setup.log
- 16:09:05 01/11/19 Removed ./setup_error.log
- 16:09:05 01/11/19 Installing Gluu Server
- 16:09:05 01/11/19 ./setup.properties Properties not found. Interactive setup commencing...
- 16:09:56 01/11/19 Checking properties
- 16:09:58 01/11/19 Running: /usr/sbin/useradd --system --create-home --user-group --shell /bin/bash --home-dir /home/ldap ldap
- 16:09:58 01/11/19 Running: /usr/sbin/useradd --system --create-home --user-group --shell /bin/bash --home-dir /home/jetty jetty
- 16:09:58 01/11/19 Running: /usr/sbin/useradd --system --create-home --user-group --shell /bin/bash --home-dir /home/node node
- 16:09:58 01/11/19 Running: /usr/sbin/groupadd gluu
- 16:09:58 01/11/19 Running: /usr/sbin/usermod -a -G gluu ldap
- 16:09:58 01/11/19 Running: /usr/sbin/usermod -a -G gluu jetty
- 16:09:58 01/11/19 Running: /usr/sbin/usermod -a -G gluu node
- 16:09:58 01/11/19 Running: /usr/sbin/usermod -a -G adm ldap
- 16:09:58 01/11/19 Running: /bin/chmod ga+w /tmp
- 16:09:58 01/11/19 Running: /bin/mkdir -p /opt/gluu
- 16:09:58 01/11/19 Running: /bin/mkdir -p /opt/gluu/bin
- 16:09:58 01/11/19 Running: /bin/mkdir -p /opt/gluu/system
- 16:09:58 01/11/19 Running: /bin/mkdir -p /opt/gluu/python
- 16:09:58 01/11/19 Running: /bin/mkdir -p /etc/gluu/conf
- 16:09:58 01/11/19 Running: /bin/mkdir -p /etc/certs
- 16:09:58 01/11/19 Running: /bin/mkdir -p ./output
- 16:09:58 01/11/19 Running: /bin/mkdir -p /home/jetty/lib
- 16:09:58 01/11/19 Running: /bin/mkdir -m 775 -p /var/ox/photos
- 16:09:58 01/11/19 Running: /bin/mkdir -m 775 -p /var/ox/identity/removed
- 16:09:58 01/11/19 Running: /bin/mkdir -m 775 -p /var/ox/identity/cr-snapshots
- 16:09:58 01/11/19 Running: /bin/chown -R root:gluu /var/ox/photos
- 16:09:58 01/11/19 Running: /bin/chown -R root:gluu /var/ox/identity/removed
- 16:09:58 01/11/19 Running: /bin/chown -R root:gluu /var/ox/identity/cr-snapshots
- 16:09:59 01/11/19 Running: /usr/bin/curl http://download.oracle.com/otn-pub/java/jce/8/jce_policy-8.zip -s -j -k -L -H Cookie:oraclelicense=accept-securebackup-cookie -o /opt/dist/app/jce_policy-8.zip
- 16:09:59 01/11/19 Calculating memory setting for applications
- 16:09:59 01/11/19 Installing server JRE 1.8 181...
- 16:09:59 01/11/19 Extracting server-jre-8u181-linux-x64.tar.gz into /opt/
- 16:09:59 01/11/19 Running: tar -xzf /opt/dist/app/server-jre-8u181-linux-x64.tar.gz -C /opt/ --no-xattrs --no-same-owner --no-same-permissions
- 16:10:01 01/11/19 Unzipping jce_policy-8.zip in /tmp
- 16:10:01 01/11/19 Running: unzip -n -q /opt/dist/app/jce_policy-8.zip -d /tmp
- 16:10:01 01/11/19 Copied tree /tmp/UnlimitedJCEPolicyJDK8 to /opt/jdk1.8.0_181/jre/lib/security
- 16:10:01 01/11/19 Removed dir: /tmp/UnlimitedJCEPolicyJDK8
- 16:10:01 01/11/19 Running: /bin/ln -sf /opt/jdk1.8.0_181 /opt/jre
- 16:10:01 01/11/19 Running: /bin/chmod -R 755 /opt/jdk1.8.0_181/bin/
- 16:10:01 01/11/19 Running: /bin/chown -R root:root /opt/jdk1.8.0_181
- 16:10:01 01/11/19 Running: /bin/chown -h root:root /opt/jre
- 16:10:01 01/11/19 Installing jetty 9.4.12.v20180830...
- 16:10:01 01/11/19 Running: /bin/mkdir -p /opt/jetty-9.4/temp
- 16:10:01 01/11/19 Running: /bin/chown -R jetty:jetty /opt/jetty-9.4/temp
- 16:10:01 01/11/19 Extracting jetty-distribution-9.4.12.v20180830.tar.gz into /opt/jetty
- 16:10:01 01/11/19 Running: tar -xzf /opt/dist/app/jetty-distribution-9.4.12.v20180830.tar.gz -C /opt/jetty-9.4 --no-xattrs --no-same-owner --no-same-permissions
- 16:10:01 01/11/19 Running: /bin/ln -sf /opt/jetty-9.4/jetty-distribution-9.4.12.v20180830 /opt/jetty
- 16:10:01 01/11/19 Running: /bin/chmod -R 755 /opt/jetty-9.4/jetty-distribution-9.4.12.v20180830/bin/
- 16:10:01 01/11/19 Applying changes to jetty files...
- 16:10:01 01/11/19 Created backup of jetty file /opt/jetty/etc/webdefault.xml.bak...
- 16:10:01 01/11/19 Wrote updated jetty file /opt/jetty/etc/webdefault.xml...
- 16:10:01 01/11/19 Created backup of jetty file /opt/jetty/etc/jetty.xml.bak...
- 16:10:01 01/11/19 Wrote updated jetty file /opt/jetty/etc/jetty.xml...
- 16:10:01 01/11/19 Running: /bin/chown -R jetty:jetty /opt/jetty-9.4/jetty-distribution-9.4.12.v20180830
- 16:10:01 01/11/19 Running: /bin/chown -h jetty:jetty /opt/jetty
- 16:10:01 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty
- 16:10:01 01/11/19 Running: /bin/chown -R jetty:jetty /opt/gluu/jetty
- 16:10:01 01/11/19 Running: /bin/mkdir -p /var/run/jetty
- 16:10:01 01/11/19 Running: /bin/chmod -R 775 /var/run/jetty
- 16:10:01 01/11/19 Running: /bin/chgrp -R jetty /var/run/jetty
- 16:10:01 01/11/19 Installing Jython 2.7.2a...
- 16:10:01 01/11/19 Running: rm -rf /opt*-2.7.2a
- 16:10:01 01/11/19 Running: /opt/jre/bin/java -jar /opt/dist/app/jython-installer-2.7.2a.jar -v -s -d /opt/jython-2.7.2a -t standard -e ensurepip
- 16:10:04 01/11/19 system properties dumped to /tmp/System3402596516046304555.properties
- reading jar info
- using the console installer
- Performing silent installation
- specification version: '1.8'
- excluding directory META-INF/
- excluding directory extlibs/
- excluding directory extlibs/cpptasks/
- excluding directory extlibs/mockrunner-0.4.1/
- excluding directory extlibs/mockrunner-0.4.1/jar/
- excluding directory extlibs/mockrunner-0.4.1/jar/j2ee1.3/
- excluding directory extlibs/mockrunner-0.4.1/lib/
- excluding directory extlibs/mockrunner-0.4.1/lib/jdk1.5/
- excluding directory extlibs/mockrunner-0.4.1/lib/jdk1.5/j2ee1.3/
- excluding directory grammar/
- excluding directory org/
- excluding directory org/apache/
- excluding directory org/apache/commons/
- excluding directory org/apache/commons/cli/
- excluding directory org/python/
- excluding directory org/python/util/
- excluding directory org/python/util/install/
- excluding directory org/python/util/install/driver/
- excluding directory src/
- excluding directory src/com/
- excluding directory src/com/xhaus/
- excluding directory src/com/xhaus/modjy/
- excluding directory src/com/ziclix/
- excluding directory src/com/ziclix/python/
- excluding directory src/com/ziclix/python/sql/
- excluding directory src/com/ziclix/python/sql/connect/
- excluding directory src/com/ziclix/python/sql/handler/
- excluding directory src/com/ziclix/python/sql/pipe/
- excluding directory src/com/ziclix/python/sql/pipe/csv/
- excluding directory src/com/ziclix/python/sql/pipe/db/
- excluding directory src/com/ziclix/python/sql/procedure/
- excluding directory src/com/ziclix/python/sql/resource/
- excluding directory src/com/ziclix/python/sql/util/
- excluding directory src/org/
- excluding directory src/org/python/
- excluding directory src/org/python/antlr/
- excluding directory src/org/python/antlr/adapter/
- excluding directory src/org/python/antlr/ast/
- excluding directory src/org/python/antlr/base/
- excluding directory src/org/python/antlr/op/
- excluding directory src/org/python/compiler/
- excluding directory src/org/python/core/
- excluding directory src/org/python/core/adapter/
- excluding directory src/org/python/core/buffer/
- excluding directory src/org/python/core/finalization/
- excluding directory src/org/python/core/io/
- excluding directory src/org/python/core/packagecache/
- excluding directory src/org/python/core/stringlib/
- excluding directory src/org/python/core/util/
- excluding directory src/org/python/expose/
- excluding directory src/org/python/expose/generate/
- excluding directory src/org/python/indexer/
- excluding directory src/org/python/indexer/ast/
- excluding directory src/org/python/indexer/demos/
- excluding directory src/org/python/indexer/types/
- excluding directory src/org/python/jsr223/
- excluding directory src/org/python/modules/
- excluding directory src/org/python/modules/_collections/
- excluding directory src/org/python/modules/_csv/
- excluding directory src/org/python/modules/_functools/
- excluding directory src/org/python/modules/_io/
- excluding directory src/org/python/modules/_json/
- excluding directory src/org/python/modules/_jythonlib/
- excluding directory src/org/python/modules/_threading/
- excluding directory src/org/python/modules/_weakref/
- excluding directory src/org/python/modules/bz2/
- excluding directory src/org/python/modules/itertools/
- excluding directory src/org/python/modules/jffi/
- excluding directory src/org/python/modules/posix/
- excluding directory src/org/python/modules/random/
- excluding directory src/org/python/modules/sre/
- excluding directory src/org/python/modules/thread/
- excluding directory src/org/python/modules/time/
- excluding directory src/org/python/modules/zipimport/
- excluding directory src/org/python/util/
- excluding directory src/shell/
- excluding directory src/templates/
- 10 %
- 20 %
- 30 %
- 40 %
- 50 %
- 60 %
- 70 %
- 80 %
- 90 %
- 100 %
- 110 %
- 120 %
- 130 %
- 140 %
- 150 %
- Generating start scripts ...
- 100 %
- Congratulations! You successfully installed Jython 2.7.2a1+ to directory /opt/jython-2.7.2a.
- 16:10:04 01/11/19 Running: /bin/ln -sf /opt/jython-2.7.2a /opt/jython
- 16:10:04 01/11/19 Running: /bin/chown -R root:root /opt/jython-2.7.2a
- 16:10:04 01/11/19 Running: /bin/chown -h root:root /opt/jython
- 16:10:04 01/11/19 Installing node 9.9.0...
- 16:10:04 01/11/19 Extracting node-v9.9.0-linux-x64.tar.xz into /opt
- 16:10:04 01/11/19 Running: tar -xJf /opt/dist/app/node-v9.9.0-linux-x64.tar.xz -C /opt/ --no-xattrs --no-same-owner --no-same-permissions
- 16:10:05 01/11/19 Running: /bin/ln -sf /opt/node-v9.9.0-linux-x64 /opt/node
- 16:10:05 01/11/19 Running: /bin/chmod -R 755 /opt/node-v9.9.0-linux-x64/bin/
- 16:10:05 01/11/19 Running: /bin/mkdir -p /opt/node/temp
- 16:10:05 01/11/19 Copied ./static/system/initd/node to /opt/gluu/system
- 16:10:05 01/11/19 Copied ./static/system/initd/passport to /opt/gluu/system
- 16:10:05 01/11/19 Running: /bin/chmod -R 755 /opt/gluu/system/node
- 16:10:05 01/11/19 Running: /bin/chmod -R 755 /opt/gluu/system/passport
- 16:10:05 01/11/19 Running: /bin/chown -R node:node /opt/node-v9.9.0-linux-x64
- 16:10:05 01/11/19 Running: /bin/chown -h node:node /opt/node
- 16:10:05 01/11/19 Running: /bin/mkdir -p /opt/gluu/node
- 16:10:05 01/11/19 Running: /bin/chown -R node:node /opt/gluu/node
- 16:10:06 01/11/19 Copying script files
- 16:10:06 01/11/19 Copied ./static/scripts/logmanager.sh to /opt/gluu/bin
- 16:10:06 01/11/19 Copied ./static/scripts/testBind.py to /opt/gluu/bin
- 16:10:06 01/11/19 Rendering encode.py
- 16:10:06 01/11/19 Running: /bin/chmod -R 700 /opt/gluu/bin
- 16:10:06 01/11/19 Encoding passwords
- 16:10:06 01/11/19 Encoding test passwords
- 16:10:06 01/11/19 Installing Gluu base...
- 16:10:06 01/11/19 Preparing files needed to run OpenId keys generator
- 16:10:06 01/11/19 Unpacking oxauth.war...
- 16:10:06 01/11/19 Created dir: /opt/dist/gluu/tmp_oxauth
- 16:10:06 01/11/19 Running: /opt/jre/bin/jar xf /opt/dist/gluu/oxauth.war
- 16:10:07 01/11/19 Copying files to /home/jetty/lib...
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/bcprov-jdk15on-1.54.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/bcpkix-jdk15on-1.54.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/commons-lang-2.6.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/log4j-slf4j-impl-2.8.2.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/log4j-1.2-api-2.8.2.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/log4j-plugin-fluency-1.3.2.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/log4j-api-2.8.2.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/log4j-core-2.8.2.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/log4j-jul-2.8.2.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/commons-codec-1.7.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/commons-cli-1.3.1.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/commons-io-2.6.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/jackson-core-2.9.5.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/jackson-core-asl-1.9.11.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/jackson-core-asl-1.9.11.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/jackson-mapper-asl-1.9.11.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/jackson-xc-1.9.13.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/jettison-1.3.2.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/oxauth-model-3.1.4.Final.jar to /home/jetty/lib
- 16:10:07 01/11/19 Copied /opt/dist/gluu/tmp_oxauth/WEB-INF/lib/oxauth-client-3.1.4.Final.jar to /home/jetty/lib
- 16:10:07 01/11/19 Removed dir: /opt/dist/gluu/tmp_oxauth
- 16:10:07 01/11/19 Generating oxAuth OpenID Connect keys
- 16:10:07 01/11/19 Creating empty JKS keystore
- 16:10:07 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -genkey -alias dummy -keystore /etc/certs/scim-rs.jks -storepass bCzI4eZrTUCK -keypass bCzI4eZrTUCK -dname "CN=oxAuth CA Certificates"
- 16:10:07 01/11/19
- Warning:
- The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /etc/certs/scim-rs.jks -destkeystore /etc/certs/scim-rs.jks -deststoretype pkcs12".
- 16:10:07 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -delete -alias dummy -keystore /etc/certs/scim-rs.jks -storepass bCzI4eZrTUCK -keypass bCzI4eZrTUCK -dname "CN=oxAuth CA Certificates"
- 16:10:07 01/11/19 Runnning: /bin/sh -c /opt/jre/bin/java -Dlog4j.defaultInitOverride=true -cp /home/jetty/lib/bcprov-jdk15on-1.54.jar:/home/jetty/lib/bcpkix-jdk15on-1.54.jar:/home/jetty/lib/commons-lang-2.6.jar:/home/jetty/lib/log4j-slf4j-impl-2.8.2.jar:/home/jetty/lib/log4j-1.2-api-2.8.2.jar:/home/jetty/lib/log4j-plugin-fluency-1.3.2.jar:/home/jetty/lib/log4j-api-2.8.2.jar:/home/jetty/lib/log4j-core-2.8.2.jar:/home/jetty/lib/log4j-jul-2.8.2.jar:/home/jetty/lib/commons-codec-1.7.jar:/home/jetty/lib/commons-cli-1.3.1.jar:/home/jetty/lib/commons-io-2.6.jar:/home/jetty/lib/jackson-core-2.9.5.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-mapper-asl-1.9.11.jar:/home/jetty/lib/jackson-xc-1.9.13.jar:/home/jetty/lib/jettison-1.3.2.jar:/home/jetty/lib/oxauth-model-3.1.4.Final.jar:/home/jetty/lib/oxauth-client-3.1.4.Final.jar org.xdi.oxauth.util.KeyGenerator -keystore /etc/certs/scim-rs.jks -keypasswd bCzI4eZrTUCK -sig_keys RS256 RS384 RS512 ES256 ES384 ES512 -enc_keys RS256 RS384 RS512 ES256 ES384 ES512 -dnname "CN=oxAuth CA Certificates" -expiration 365
- 16:10:09 01/11/19 Generating oxAuth OpenID Connect keys
- 16:10:09 01/11/19 Creating empty JKS keystore
- 16:10:09 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -genkey -alias dummy -keystore ./output/scim-rp.jks -storepass secret -keypass secret -dname "CN=oxAuth CA Certificates"
- 16:10:09 01/11/19
- Warning:
- The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore ./output/scim-rp.jks -destkeystore ./output/scim-rp.jks -deststoretype pkcs12".
- 16:10:09 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -delete -alias dummy -keystore ./output/scim-rp.jks -storepass secret -keypass secret -dname "CN=oxAuth CA Certificates"
- 16:10:09 01/11/19 Runnning: /bin/sh -c /opt/jre/bin/java -Dlog4j.defaultInitOverride=true -cp /home/jetty/lib/bcprov-jdk15on-1.54.jar:/home/jetty/lib/bcpkix-jdk15on-1.54.jar:/home/jetty/lib/commons-lang-2.6.jar:/home/jetty/lib/log4j-slf4j-impl-2.8.2.jar:/home/jetty/lib/log4j-1.2-api-2.8.2.jar:/home/jetty/lib/log4j-plugin-fluency-1.3.2.jar:/home/jetty/lib/log4j-api-2.8.2.jar:/home/jetty/lib/log4j-core-2.8.2.jar:/home/jetty/lib/log4j-jul-2.8.2.jar:/home/jetty/lib/commons-codec-1.7.jar:/home/jetty/lib/commons-cli-1.3.1.jar:/home/jetty/lib/commons-io-2.6.jar:/home/jetty/lib/jackson-core-2.9.5.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-mapper-asl-1.9.11.jar:/home/jetty/lib/jackson-xc-1.9.13.jar:/home/jetty/lib/jettison-1.3.2.jar:/home/jetty/lib/oxauth-model-3.1.4.Final.jar:/home/jetty/lib/oxauth-client-3.1.4.Final.jar org.xdi.oxauth.util.KeyGenerator -keystore ./output/scim-rp.jks -keypasswd secret -sig_keys RS256 RS384 RS512 ES256 ES384 ES512 -enc_keys RS256 RS384 RS512 ES256 ES384 ES512 -dnname "CN=oxAuth CA Certificates" -expiration 365
- 16:10:12 01/11/19 Generating oxAuth OpenID Connect keys
- 16:10:12 01/11/19 Creating empty JKS keystore
- 16:10:12 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -genkey -alias dummy -keystore /etc/certs/passport-rs.jks -storepass XodE0cI93swv -keypass XodE0cI93swv -dname "CN=oxAuth CA Certificates"
- 16:10:12 01/11/19
- Warning:
- The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /etc/certs/passport-rs.jks -destkeystore /etc/certs/passport-rs.jks -deststoretype pkcs12".
- 16:10:12 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -delete -alias dummy -keystore /etc/certs/passport-rs.jks -storepass XodE0cI93swv -keypass XodE0cI93swv -dname "CN=oxAuth CA Certificates"
- 16:10:13 01/11/19 Runnning: /bin/sh -c /opt/jre/bin/java -Dlog4j.defaultInitOverride=true -cp /home/jetty/lib/bcprov-jdk15on-1.54.jar:/home/jetty/lib/bcpkix-jdk15on-1.54.jar:/home/jetty/lib/commons-lang-2.6.jar:/home/jetty/lib/log4j-slf4j-impl-2.8.2.jar:/home/jetty/lib/log4j-1.2-api-2.8.2.jar:/home/jetty/lib/log4j-plugin-fluency-1.3.2.jar:/home/jetty/lib/log4j-api-2.8.2.jar:/home/jetty/lib/log4j-core-2.8.2.jar:/home/jetty/lib/log4j-jul-2.8.2.jar:/home/jetty/lib/commons-codec-1.7.jar:/home/jetty/lib/commons-cli-1.3.1.jar:/home/jetty/lib/commons-io-2.6.jar:/home/jetty/lib/jackson-core-2.9.5.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-mapper-asl-1.9.11.jar:/home/jetty/lib/jackson-xc-1.9.13.jar:/home/jetty/lib/jettison-1.3.2.jar:/home/jetty/lib/oxauth-model-3.1.4.Final.jar:/home/jetty/lib/oxauth-client-3.1.4.Final.jar org.xdi.oxauth.util.KeyGenerator -keystore /etc/certs/passport-rs.jks -keypasswd XodE0cI93swv -sig_keys RS256 RS384 RS512 ES256 ES384 ES512 -enc_keys RS256 RS384 RS512 ES256 ES384 ES512 -dnname "CN=oxAuth CA Certificates" -expiration 365
- 16:10:15 01/11/19 Generating oxAuth OpenID Connect keys
- 16:10:15 01/11/19 Creating empty JKS keystore
- 16:10:15 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -genkey -alias dummy -keystore /etc/certs/passport-rp.jks -storepass secret -keypass secret -dname "CN=oxAuth CA Certificates"
- 16:10:16 01/11/19
- Warning:
- The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /etc/certs/passport-rp.jks -destkeystore /etc/certs/passport-rp.jks -deststoretype pkcs12".
- 16:10:16 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -delete -alias dummy -keystore /etc/certs/passport-rp.jks -storepass secret -keypass secret -dname "CN=oxAuth CA Certificates"
- 16:10:16 01/11/19 Runnning: /bin/sh -c /opt/jre/bin/java -Dlog4j.defaultInitOverride=true -cp /home/jetty/lib/bcprov-jdk15on-1.54.jar:/home/jetty/lib/bcpkix-jdk15on-1.54.jar:/home/jetty/lib/commons-lang-2.6.jar:/home/jetty/lib/log4j-slf4j-impl-2.8.2.jar:/home/jetty/lib/log4j-1.2-api-2.8.2.jar:/home/jetty/lib/log4j-plugin-fluency-1.3.2.jar:/home/jetty/lib/log4j-api-2.8.2.jar:/home/jetty/lib/log4j-core-2.8.2.jar:/home/jetty/lib/log4j-jul-2.8.2.jar:/home/jetty/lib/commons-codec-1.7.jar:/home/jetty/lib/commons-cli-1.3.1.jar:/home/jetty/lib/commons-io-2.6.jar:/home/jetty/lib/jackson-core-2.9.5.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-mapper-asl-1.9.11.jar:/home/jetty/lib/jackson-xc-1.9.13.jar:/home/jetty/lib/jettison-1.3.2.jar:/home/jetty/lib/oxauth-model-3.1.4.Final.jar:/home/jetty/lib/oxauth-client-3.1.4.Final.jar org.xdi.oxauth.util.KeyGenerator -keystore /etc/certs/passport-rp.jks -keypasswd secret -sig_keys RS256 RS384 RS512 ES256 ES384 ES512 -enc_keys RS256 RS384 RS512 ES256 ES384 ES512 -dnname "CN=oxAuth CA Certificates" -expiration 365
- 16:10:18 01/11/19 Loading file ./static/extension/user_registration/ConfirmRegistrationSampleScript.py
- 16:10:18 01/11/19 Loaded script ConfirmRegistrationSampleScript.py with type user_registration into user_registration_confirmregistrationsamplescript
- 16:10:18 01/11/19 Loading file ./static/extension/user_registration/SampleScript.py
- 16:10:18 01/11/19 Loaded script SampleScript.py with type user_registration into user_registration_samplescript
- 16:10:18 01/11/19 Loading file ./static/extension/consent_gathering/ConsentGatheringSample.py
- 16:10:18 01/11/19 Loaded script ConsentGatheringSample.py with type consent_gathering into consent_gathering_consentgatheringsample
- 16:10:18 01/11/19 Loading file ./static/extension/id_generator/SampleScript.py
- 16:10:18 01/11/19 Loaded script SampleScript.py with type id_generator into id_generator_samplescript
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/U2fExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script U2fExternalAuthenticator.py with type person_authentication into person_authentication_u2fexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/YubicloudExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script YubicloudExternalAuthenticator.py with type person_authentication into person_authentication_yubicloudexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/SamlExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script SamlExternalAuthenticator.py with type person_authentication into person_authentication_samlexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/OtpExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script OtpExternalAuthenticator.py with type person_authentication into person_authentication_otpexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/UserCertExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script UserCertExternalAuthenticator.py with type person_authentication into person_authentication_usercertexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/SamlPassportAuthenticator.py
- 16:10:18 01/11/19 Loaded script SamlPassportAuthenticator.py with type person_authentication into person_authentication_samlpassportauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/BasicLockAccountExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script BasicLockAccountExternalAuthenticator.py with type person_authentication into person_authentication_basiclockaccountexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/Casa.py
- 16:10:18 01/11/19 Loaded script Casa.py with type person_authentication into person_authentication_casa
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/PassportExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script PassportExternalAuthenticator.py with type person_authentication into person_authentication_passportexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/ThumbSignInExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script ThumbSignInExternalAuthenticator.py with type person_authentication into person_authentication_thumbsigninexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/UafExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script UafExternalAuthenticator.py with type person_authentication into person_authentication_uafexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/twilio2FA.py
- 16:10:18 01/11/19 Loaded script twilio2FA.py with type person_authentication into person_authentication_twilio2fa
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/BasicExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script BasicExternalAuthenticator.py with type person_authentication into person_authentication_basicexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/SuperGluuExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script SuperGluuExternalAuthenticator.py with type person_authentication into person_authentication_supergluuexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/person_authentication/DuoExternalAuthenticator.py
- 16:10:18 01/11/19 Loaded script DuoExternalAuthenticator.py with type person_authentication into person_authentication_duoexternalauthenticator
- 16:10:18 01/11/19 Loading file ./static/extension/uma_claims_gathering/uma_claims_gathering.py
- 16:10:18 01/11/19 Loaded script uma_claims_gathering.py with type uma_claims_gathering into uma_claims_gathering_uma_claims_gathering
- 16:10:18 01/11/19 Loading file ./static/extension/cache_refresh/SampleScript.py
- 16:10:18 01/11/19 Loaded script SampleScript.py with type cache_refresh into cache_refresh_samplescript
- 16:10:18 01/11/19 Loading file ./static/extension/scim/SampleScript.py
- 16:10:18 01/11/19 Loaded script SampleScript.py with type scim into scim_samplescript
- 16:10:18 01/11/19 Loading file ./static/extension/uma_rpt_policy/uma_rpt_policy.py
- 16:10:18 01/11/19 Loaded script uma_rpt_policy.py with type uma_rpt_policy into uma_rpt_policy_uma_rpt_policy
- 16:10:18 01/11/19 Loading file ./static/extension/uma_rpt_policy/UmaClientAuthzRptPolicy.py
- 16:10:18 01/11/19 Loaded script UmaClientAuthzRptPolicy.py with type uma_rpt_policy into uma_rpt_policy_umaclientauthzrptpolicy
- 16:10:18 01/11/19 Loading file ./static/extension/client_registration/Casa.py
- 16:10:18 01/11/19 Loaded script Casa.py with type client_registration into client_registration_casa
- 16:10:18 01/11/19 Loading file ./static/extension/client_registration/SampleScript.py
- 16:10:18 01/11/19 Loaded script SampleScript.py with type client_registration into client_registration_samplescript
- 16:10:18 01/11/19 Loading file ./static/extension/application_session/SampleScript.py
- 16:10:18 01/11/19 Loaded script SampleScript.py with type application_session into application_session_samplescript
- 16:10:18 01/11/19 Loading file ./static/extension/dynamic_scope/org_name.py
- 16:10:18 01/11/19 Loaded script org_name.py with type dynamic_scope into dynamic_scope_org_name
- 16:10:18 01/11/19 Loading file ./static/extension/dynamic_scope/work_phone.py
- 16:10:18 01/11/19 Loaded script work_phone.py with type dynamic_scope into dynamic_scope_work_phone
- 16:10:18 01/11/19 Loading file ./static/extension/dynamic_scope/dynamic_permission.py
- 16:10:18 01/11/19 Loaded script dynamic_permission.py with type dynamic_scope into dynamic_scope_dynamic_permission
- 16:10:18 01/11/19 Loading file ./static/extension/update_user/SampleScript.py
- 16:10:18 01/11/19 Loaded script SampleScript.py with type update_user into update_user_samplescript
- 16:10:18 01/11/19 Rendering templates
- 16:10:18 01/11/19 Rendering template /opt/gluu/python/libs/python.txt
- 16:10:18 01/11/19 Rendering template ./output/scripts_casa.ldif
- 16:10:18 01/11/19 Rendering template ./output/oxpassport-config.ldif
- 16:10:18 01/11/19 Rendering template /etc/hostname
- 16:10:18 01/11/19 Rendering template ./output/oxauth-static-conf.json
- 16:10:18 01/11/19 Rendering template ./output/clients.ldif
- 16:10:18 01/11/19 Rendering template /etc/hosts
- 16:10:18 01/11/19 Rendering template ./templates/opendj-setup.properties
- 16:10:18 01/11/19 Rendering template ./output/oxasimba-config.json
- 16:10:18 01/11/19 Rendering template /etc/gluu/conf/passport-saml-config.json
- 16:10:18 01/11/19 Rendering template ./output/httpd_2.4.conf
- 16:10:18 01/11/19 Rendering template ./output/https_gluu.conf
- 16:10:18 01/11/19 Rendering template ./output/oxidp.ldif
- 16:10:18 01/11/19 Rendering template ./output/asimba.properties
- 16:10:18 01/11/19 Rendering template ./output/scripts.ldif
- 16:10:18 01/11/19 Rendering template ./output/scim.ldif
- 16:10:18 01/11/19 Rendering template ./output/appliance.ldif
- 16:10:18 01/11/19 Rendering template /etc/gluu/conf/oxTrustLogRotationConfiguration.xml
- 16:10:18 01/11/19 Rendering template ./output/groups.ldif
- 16:10:18 01/11/19 Rendering template ./output/base.ldif
- 16:10:18 01/11/19 Rendering template ./output/asimba-selector.xml
- 16:10:18 01/11/19 Rendering template ./output/asimba.xml
- 16:10:18 01/11/19 Rendering template ./output/oxtrust-config.json
- 16:10:18 01/11/19 Rendering template ./output/passport.ldif
- 16:10:18 01/11/19 Rendering template ./output/attributes.ldif
- 16:10:18 01/11/19 Rendering template ./output/casa.json
- 16:10:18 01/11/19 Rendering template ./output/asimba.ldif
- 16:10:18 01/11/19 Rendering template ./output/oxauth-config.json
- 16:10:18 01/11/19 Rendering template ./output/httpd.conf
- 16:10:18 01/11/19 Rendering template /etc/sysconfig/network
- 16:10:18 01/11/19 Rendering template ./output/oxtrust-cache-refresh.json
- 16:10:18 01/11/19 Rendering template /etc/gluu/conf/ox-ldap.properties
- 16:10:18 01/11/19 Rendering template ./output/people.ldif
- 16:10:18 01/11/19 Rendering template ./output/oxtrust-import-person.json
- 16:10:18 01/11/19 Rendering template ./output/oxidp-config.json
- 16:10:18 01/11/19 Rendering template ./output/scopes.ldif
- 16:10:19 01/11/19 Generating certificates and keystores
- 16:10:19 01/11/19 Generating Certificate for httpd
- 16:10:19 01/11/19 Running: /usr/bin/openssl genrsa -des3 -out /etc/certs/httpd.key.orig -passout pass:VjvAWwJwBWiP 2048
- 16:10:19 01/11/19 Generating RSA private key, 2048 bit long modulus
- ........................+++
- ................................+++
- e is 65537 (0x10001)
- 16:10:19 01/11/19 Running: /usr/bin/openssl rsa -in /etc/certs/httpd.key.orig -passin pass:VjvAWwJwBWiP -out /etc/certs/httpd.key
- 16:10:19 01/11/19 writing RSA key
- 16:10:19 01/11/19 Running: /usr/bin/openssl req -new -key /etc/certs/httpd.key -out /etc/certs/httpd.csr -subj /C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- 16:10:19 01/11/19 Running: /usr/bin/openssl x509 -req -days 365 -in /etc/certs/httpd.csr -signkey /etc/certs/httpd.key -out /etc/certs/httpd.crt
- 16:10:19 01/11/19 Signature ok
- subject=/C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- Getting Private key
- 16:10:19 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/httpd.key.orig
- 16:10:19 01/11/19 Running: /bin/chmod 700 /etc/certs/httpd.key.orig
- 16:10:19 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/httpd.key
- 16:10:19 01/11/19 Running: /bin/chmod 700 /etc/certs/httpd.key
- 16:10:19 01/11/19 Running: /opt/jre/bin/keytool -import -trustcacerts -alias dev-auth.azya.io_httpd -file /etc/certs/httpd.crt -keystore /opt/jre/jre/lib/security/cacerts -storepass changeit -noprompt
- 16:10:19 01/11/19 Certificate was added to keystore
- 16:10:19 01/11/19 Generating Certificate for shibIDP
- 16:10:19 01/11/19 Running: /usr/bin/openssl genrsa -des3 -out /etc/certs/shibIDP.key.orig -passout pass:36Eu6viVFpTK 2048
- 16:10:19 01/11/19 Generating RSA private key, 2048 bit long modulus
- ..+++
- ................................................+++
- e is 65537 (0x10001)
- 16:10:19 01/11/19 Running: /usr/bin/openssl rsa -in /etc/certs/shibIDP.key.orig -passin pass:36Eu6viVFpTK -out /etc/certs/shibIDP.key
- 16:10:19 01/11/19 writing RSA key
- 16:10:19 01/11/19 Running: /usr/bin/openssl req -new -key /etc/certs/shibIDP.key -out /etc/certs/shibIDP.csr -subj /C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- 16:10:19 01/11/19 Running: /usr/bin/openssl x509 -req -days 365 -in /etc/certs/shibIDP.csr -signkey /etc/certs/shibIDP.key -out /etc/certs/shibIDP.crt
- 16:10:19 01/11/19 Signature ok
- subject=/C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- Getting Private key
- 16:10:19 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/shibIDP.key.orig
- 16:10:19 01/11/19 Running: /bin/chmod 700 /etc/certs/shibIDP.key.orig
- 16:10:19 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/shibIDP.key
- 16:10:19 01/11/19 Running: /bin/chmod 700 /etc/certs/shibIDP.key
- 16:10:19 01/11/19 Running: /opt/jre/bin/keytool -import -trustcacerts -alias dev-auth.azya.io_shibIDP -file /etc/certs/shibIDP.crt -keystore /opt/jre/jre/lib/security/cacerts -storepass changeit -noprompt
- 16:10:19 01/11/19 Certificate was added to keystore
- 16:10:19 01/11/19 Generating Certificate for idp-encryption
- 16:10:19 01/11/19 Running: /usr/bin/openssl genrsa -des3 -out /etc/certs/idp-encryption.key.orig -passout pass:36Eu6viVFpTK 2048
- 16:10:20 01/11/19 Generating RSA private key, 2048 bit long modulus
- .................+++
- .......................................................................................................+++
- e is 65537 (0x10001)
- 16:10:20 01/11/19 Running: /usr/bin/openssl rsa -in /etc/certs/idp-encryption.key.orig -passin pass:36Eu6viVFpTK -out /etc/certs/idp-encryption.key
- 16:10:20 01/11/19 writing RSA key
- 16:10:20 01/11/19 Running: /usr/bin/openssl req -new -key /etc/certs/idp-encryption.key -out /etc/certs/idp-encryption.csr -subj /C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- 16:10:20 01/11/19 Running: /usr/bin/openssl x509 -req -days 365 -in /etc/certs/idp-encryption.csr -signkey /etc/certs/idp-encryption.key -out /etc/certs/idp-encryption.crt
- 16:10:20 01/11/19 Signature ok
- subject=/C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- Getting Private key
- 16:10:20 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/idp-encryption.key.orig
- 16:10:20 01/11/19 Running: /bin/chmod 700 /etc/certs/idp-encryption.key.orig
- 16:10:20 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/idp-encryption.key
- 16:10:20 01/11/19 Running: /bin/chmod 700 /etc/certs/idp-encryption.key
- 16:10:20 01/11/19 Running: /opt/jre/bin/keytool -import -trustcacerts -alias dev-auth.azya.io_idp-encryption -file /etc/certs/idp-encryption.crt -keystore /opt/jre/jre/lib/security/cacerts -storepass changeit -noprompt
- 16:10:20 01/11/19 Certificate was added to keystore
- 16:10:20 01/11/19 Generating Certificate for idp-signing
- 16:10:20 01/11/19 Running: /usr/bin/openssl genrsa -des3 -out /etc/certs/idp-signing.key.orig -passout pass:36Eu6viVFpTK 2048
- 16:10:20 01/11/19 Generating RSA private key, 2048 bit long modulus
- .......+++
- ................................+++
- e is 65537 (0x10001)
- 16:10:20 01/11/19 Running: /usr/bin/openssl rsa -in /etc/certs/idp-signing.key.orig -passin pass:36Eu6viVFpTK -out /etc/certs/idp-signing.key
- 16:10:20 01/11/19 writing RSA key
- 16:10:20 01/11/19 Running: /usr/bin/openssl req -new -key /etc/certs/idp-signing.key -out /etc/certs/idp-signing.csr -subj /C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- 16:10:20 01/11/19 Running: /usr/bin/openssl x509 -req -days 365 -in /etc/certs/idp-signing.csr -signkey /etc/certs/idp-signing.key -out /etc/certs/idp-signing.crt
- 16:10:20 01/11/19 Signature ok
- subject=/C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- Getting Private key
- 16:10:20 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/idp-signing.key.orig
- 16:10:20 01/11/19 Running: /bin/chmod 700 /etc/certs/idp-signing.key.orig
- 16:10:20 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/idp-signing.key
- 16:10:20 01/11/19 Running: /bin/chmod 700 /etc/certs/idp-signing.key
- 16:10:20 01/11/19 Running: /opt/jre/bin/keytool -import -trustcacerts -alias dev-auth.azya.io_idp-signing -file /etc/certs/idp-signing.crt -keystore /opt/jre/jre/lib/security/cacerts -storepass changeit -noprompt
- 16:10:20 01/11/19 Certificate was added to keystore
- 16:10:20 01/11/19 Generating Certificate for asimba
- 16:10:20 01/11/19 Running: /usr/bin/openssl genrsa -des3 -out /etc/certs/asimba.key.orig -passout pass:nLgf8RqBjw6x 2048
- 16:10:20 01/11/19 Generating RSA private key, 2048 bit long modulus
- ........................+++
- .................+++
- e is 65537 (0x10001)
- 16:10:20 01/11/19 Running: /usr/bin/openssl rsa -in /etc/certs/asimba.key.orig -passin pass:nLgf8RqBjw6x -out /etc/certs/asimba.key
- 16:10:20 01/11/19 writing RSA key
- 16:10:20 01/11/19 Running: /usr/bin/openssl req -new -key /etc/certs/asimba.key -out /etc/certs/asimba.csr -subj /C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- 16:10:20 01/11/19 Running: /usr/bin/openssl x509 -req -days 365 -in /etc/certs/asimba.csr -signkey /etc/certs/asimba.key -out /etc/certs/asimba.crt
- 16:10:20 01/11/19 Signature ok
- subject=/C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=dev-auth.azya.io/emailAddress=devops@azya.io
- Getting Private key
- 16:10:20 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/asimba.key.orig
- 16:10:20 01/11/19 Running: /bin/chmod 700 /etc/certs/asimba.key.orig
- 16:10:20 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/asimba.key
- 16:10:20 01/11/19 Running: /bin/chmod 700 /etc/certs/asimba.key
- 16:10:20 01/11/19 Running: /opt/jre/bin/keytool -import -trustcacerts -alias dev-auth.azya.io_asimba -file /etc/certs/asimba.crt -keystore /opt/jre/jre/lib/security/cacerts -storepass changeit -noprompt
- 16:10:21 01/11/19 Certificate was added to keystore
- 16:10:21 01/11/19 Generating Certificate for passport-sp
- 16:10:21 01/11/19 Running: /usr/bin/openssl genrsa -des3 -out /etc/certs/passport-sp.key.orig -passout pass:a31e123VHHzg 2048
- 16:10:21 01/11/19 Generating RSA private key, 2048 bit long modulus
- .........+++
- ..........................+++
- e is 65537 (0x10001)
- 16:10:21 01/11/19 Running: /usr/bin/openssl rsa -in /etc/certs/passport-sp.key.orig -passin pass:a31e123VHHzg -out /etc/certs/passport-sp.key
- 16:10:21 01/11/19 writing RSA key
- 16:10:21 01/11/19 Running: /usr/bin/openssl req -new -key /etc/certs/passport-sp.key -out /etc/certs/passport-sp.csr -subj /C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=localhost/emailAddress=devops@azya.io
- 16:10:21 01/11/19 Running: /usr/bin/openssl x509 -req -days 365 -in /etc/certs/passport-sp.csr -signkey /etc/certs/passport-sp.key -out /etc/certs/passport-sp.crt
- 16:10:21 01/11/19 Signature ok
- subject=/C=GB/ST=GB/L=London/O=Marco Polo Trading Ltd/CN=localhost/emailAddress=devops@azya.io
- Getting Private key
- 16:10:21 01/11/19 Running: /bin/chown ldap:ldap /etc/certs/passport-sp.key.orig
- 16:10:21 01/11/19 Running: /bin/chmod 700 /etc/certs/passport-sp.key.orig
- 16:10:21 01/11/19 Running: /bin/chown ldap:ldap /etc/certs/passport-sp.key
- 16:10:21 01/11/19 Running: /bin/chmod 700 /etc/certs/passport-sp.key
- 16:10:21 01/11/19 Running: /opt/jre/bin/keytool -import -trustcacerts -alias dev-auth.azya.io_passport-sp -file /etc/certs/passport-sp.crt -keystore /opt/jre/jre/lib/security/cacerts -storepass changeit -noprompt
- 16:10:21 01/11/19 Certificate was added to keystore
- 16:10:21 01/11/19 Creating keystore shibIDP
- 16:10:21 01/11/19 Running: /usr/bin/openssl pkcs12 -export -inkey /etc/certs/shibIDP.key -in /etc/certs/shibIDP.crt -out /etc/certs/shibIDP.pkcs12 -name dev-auth.azya.io -passout pass:36Eu6viVFpTK
- 16:10:21 01/11/19 Running: /opt/jre/bin/keytool -importkeystore -srckeystore /etc/certs/shibIDP.pkcs12 -srcstorepass 36Eu6viVFpTK -srcstoretype PKCS12 -destkeystore /etc/certs/shibIDP.jks -deststorepass 36Eu6viVFpTK -deststoretype JKS -keyalg RSA -noprompt
- 16:10:21 01/11/19 Importing keystore /etc/certs/shibIDP.pkcs12 to /etc/certs/shibIDP.jks...
- Entry for alias dev-auth.azya.io successfully imported.
- Import command completed: 1 entries successfully imported, 0 entries failed or cancelled
- Warning:
- The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /etc/certs/shibIDP.jks -destkeystore /etc/certs/shibIDP.jks -deststoretype pkcs12".
- 16:10:21 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/shibIDP.pkcs12
- 16:10:21 01/11/19 Running: /bin/chmod 700 /etc/certs/shibIDP.pkcs12
- 16:10:21 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/shibIDP.jks
- 16:10:21 01/11/19 Running: /bin/chmod 700 /etc/certs/shibIDP.jks
- 16:10:21 01/11/19 Creating keystore asimba
- 16:10:21 01/11/19 Running: /usr/bin/openssl pkcs12 -export -inkey /etc/certs/asimba.key -in /etc/certs/asimba.crt -out /etc/certs/asimba.pkcs12 -name dev-auth.azya.io -passout pass:nLgf8RqBjw6x
- 16:10:21 01/11/19 Running: /opt/jre/bin/keytool -importkeystore -srckeystore /etc/certs/asimba.pkcs12 -srcstorepass nLgf8RqBjw6x -srcstoretype PKCS12 -destkeystore /etc/certs/asimbaIDP.jks -deststorepass nLgf8RqBjw6x -deststoretype JKS -keyalg RSA -noprompt
- 16:10:22 01/11/19 Importing keystore /etc/certs/asimba.pkcs12 to /etc/certs/asimbaIDP.jks...
- Entry for alias dev-auth.azya.io successfully imported.
- Import command completed: 1 entries successfully imported, 0 entries failed or cancelled
- Warning:
- The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /etc/certs/asimbaIDP.jks -destkeystore /etc/certs/asimbaIDP.jks -deststoretype pkcs12".
- 16:10:22 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/asimba.pkcs12
- 16:10:22 01/11/19 Running: /bin/chmod 700 /etc/certs/asimba.pkcs12
- 16:10:22 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/asimbaIDP.jks
- 16:10:22 01/11/19 Running: /bin/chmod 700 /etc/certs/asimbaIDP.jks
- 16:10:22 01/11/19 Running: /usr/bin/openssl x509 -inform pem -outform pem -in /etc/certs/asimba.crt -out /etc/certs/saml.pem
- 16:10:22 01/11/19 Running: /bin/chown -R jetty:jetty /etc/certs
- 16:10:22 01/11/19 Running: /bin/chmod -R 500 /etc/certs
- 16:10:22 01/11/19 Running: /bin/chmod u+w /etc/certs/asimbaIDP.jks
- 16:10:22 01/11/19 Generating oxAuth OpenID Connect keys
- 16:10:22 01/11/19 Creating empty JKS keystore
- 16:10:22 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -genkey -alias dummy -keystore /etc/certs/oxauth-keys.jks -storepass V5B89zcYb4HZ -keypass V5B89zcYb4HZ -dname "CN=oxAuth CA Certificates"
- 16:10:22 01/11/19
- Warning:
- The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /etc/certs/oxauth-keys.jks -destkeystore /etc/certs/oxauth-keys.jks -deststoretype pkcs12".
- 16:10:22 01/11/19 Running: /bin/sh -c /opt/jre/bin/keytool -delete -alias dummy -keystore /etc/certs/oxauth-keys.jks -storepass V5B89zcYb4HZ -keypass V5B89zcYb4HZ -dname "CN=oxAuth CA Certificates"
- 16:10:23 01/11/19 Runnning: /bin/sh -c /opt/jre/bin/java -Dlog4j.defaultInitOverride=true -cp /home/jetty/lib/bcprov-jdk15on-1.54.jar:/home/jetty/lib/bcpkix-jdk15on-1.54.jar:/home/jetty/lib/commons-lang-2.6.jar:/home/jetty/lib/log4j-slf4j-impl-2.8.2.jar:/home/jetty/lib/log4j-1.2-api-2.8.2.jar:/home/jetty/lib/log4j-plugin-fluency-1.3.2.jar:/home/jetty/lib/log4j-api-2.8.2.jar:/home/jetty/lib/log4j-core-2.8.2.jar:/home/jetty/lib/log4j-jul-2.8.2.jar:/home/jetty/lib/commons-codec-1.7.jar:/home/jetty/lib/commons-cli-1.3.1.jar:/home/jetty/lib/commons-io-2.6.jar:/home/jetty/lib/jackson-core-2.9.5.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-core-asl-1.9.11.jar:/home/jetty/lib/jackson-mapper-asl-1.9.11.jar:/home/jetty/lib/jackson-xc-1.9.13.jar:/home/jetty/lib/jettison-1.3.2.jar:/home/jetty/lib/oxauth-model-3.1.4.Final.jar:/home/jetty/lib/oxauth-client-3.1.4.Final.jar org.xdi.oxauth.util.KeyGenerator -keystore /etc/certs/oxauth-keys.jks -keypasswd V5B89zcYb4HZ -sig_keys RS256 RS384 RS512 ES256 ES384 ES512 -enc_keys RS256 RS384 RS512 ES256 ES384 ES512 -dnname "CN=oxAuth CA Certificates" -expiration 365
- 16:10:25 01/11/19 Writing oxAuth OpenID Connect keys
- 16:10:25 01/11/19 Running: /bin/chown jetty:jetty /etc/certs/oxauth-keys.json
- 16:10:25 01/11/19 Running: /bin/chmod 600 /etc/certs/oxauth-keys.json
- 16:10:25 01/11/19 Wrote oxAuth OpenID Connect key to /etc/certs/oxauth-keys.json
- 16:10:25 01/11/19 Loading file ./output/oxauth-config.json
- 16:10:25 01/11/19 Loading file ./output/oxauth-static-conf.json
- 16:10:25 01/11/19 Loading file ./static/oxauth/oxauth-errors.json
- 16:10:25 01/11/19 Loading file /etc/certs/oxauth-keys.json
- 16:10:25 01/11/19 Loading file ./output/oxtrust-config.json
- 16:10:25 01/11/19 Loading file ./output/oxtrust-cache-refresh.json
- 16:10:25 01/11/19 Loading file ./output/oxtrust-import-person.json
- 16:10:25 01/11/19 Loading file ./output/oxidp-config.json
- 16:10:25 01/11/19 Loading file ./output/oxasimba-config.json
- 16:10:26 01/11/19 Rendering configuration templates
- 16:10:26 01/11/19 Rendering template ./output/configuration.ldif
- 16:10:26 01/11/19 Copying hosts and hostname to final destination
- 16:10:26 01/11/19 Copied ./output/hostname to /etc/hostname
- 16:10:26 01/11/19 Running: /bin/chmod -f 644 /etc/hostname
- 16:10:26 01/11/19 Running: /bin/hostname dev-auth.azya.io
- 16:10:26 01/11/19 Copied ./output/hosts to /etc/hosts
- 16:10:26 01/11/19 Running: /bin/chmod -R 644 /etc/hosts
- 16:10:26 01/11/19 Copying rendered templates to final destination
- 16:10:26 01/11/19 Copying ./output/python.txt to /opt/gluu/python/libs/python.txt
- 16:10:26 01/11/19 Created destination folder /opt/gluu/python/libs
- 16:10:26 01/11/19 Copying ./output/passport-saml-config.json to /etc/gluu/conf/passport-saml-config.json
- 16:10:26 01/11/19 Copying ./output/oxTrustLogRotationConfiguration.xml to /etc/gluu/conf/oxTrustLogRotationConfiguration.xml
- 16:10:26 01/11/19 Copying ./output/ox-ldap.properties to /etc/gluu/conf/ox-ldap.properties
- 16:10:26 01/11/19 Running: /usr/sbin/update-rc.d apache2 defaults
- 16:10:26 01/11/19 Running: /usr/sbin/update-rc.d apache2 enable
- 16:10:26 01/11/19 Running: /usr/sbin/update-rc.d rsyslog defaults
- 16:10:26 01/11/19 Running: /usr/sbin/update-rc.d rsyslog enable
- 16:10:27 01/11/19 Rendering node templates
- 16:10:27 01/11/19 Rendering templates folder: ./templates/node/
- 16:10:27 01/11/19 Rendering test template ./templates/node//passport
- 16:10:27 01/11/19 Running OpenDJ Setup
- 16:10:27 01/11/19 Unzipping opendj-server-3.0.1.gluu.zip in /opt/
- 16:10:27 01/11/19 Running: unzip -n -q /opt/dist/app/opendj-server-3.0.1.gluu.zip -d /opt/
- 16:10:28 01/11/19 Running: /bin/chown -R ldap:ldap /opt/opendj
- 16:10:28 01/11/19 Running: /bin/chown ldap:ldap /home/ldap/.pw
- 16:10:28 01/11/19 Running OpenDJ Setup
- 16:10:28 01/11/19 Changing ownership
- 16:10:28 01/11/19 Running: /bin/chown -R root:gluu /etc/certs
- 16:10:28 01/11/19 Running: /bin/chown -R root:gluu /etc/gluu/conf
- 16:10:28 01/11/19 Running: /bin/chown -R root:gluu /opt/gluu/python
- 16:10:28 01/11/19 Running: /bin/chown -R root:gluu /var/ox
- 16:10:28 01/11/19 Running: /bin/chmod -R 440 /etc/certs
- 16:10:28 01/11/19 Running: /bin/chmod a+X /etc/certs
- 16:10:28 01/11/19 Running: /bin/chmod u+w /etc/certs/asimbaIDP.jks
- 16:10:28 01/11/19 Running: /bin/chown -R jetty:jetty /etc/certs/oxauth-keys.json
- 16:10:28 01/11/19 Running: /bin/chown -R jetty:jetty /etc/certs/oxauth-keys.jks
- 16:10:28 01/11/19 Running: /bin/su ldap -c cd /opt/opendj ; export OPENDJ_JAVA_HOME=/opt/jre ; /opt/opendj/setup --no-prompt --cli --propertiesFilePath /opt/opendj/opendj-setup.properties --acceptLicense
- 16:19:42 01/11/19
- See /tmp/opendj-setup-1821246464145907489.log for a detailed log of this operation.
- Configuring Directory Server ..... Done.
- Configuring Certificates ..... Done.
- Starting Directory Server .................................................................................................................................................................................. Done.
- To see basic server configuration status and configuration you can launch /opt/opendj/bin/status
- 16:19:42 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsjavaproperties
- 16:19:42 01/11/19 The operation was successful. The server commands will use the java arguments and java home specified in the properties file
- located in /opt/opendj/config/java.properties
- 16:19:42 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/stop-ds
- 16:21:52 01/11/19 Stopping Server...
- [11/Jan/2019:16:20:16 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 0 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:16 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 1 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:16 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 2 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:16 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 3 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:16 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 4 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:16 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 7 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:16 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 5 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 6 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 8 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 9 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 10 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 11 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 12 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 13 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 14 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:20:17 +0000] category=EXTENSIONS severity=WARNING msgID=org.opends.messages.core.113 msg=Worker Thread 15 was interrupted while waiting for new work: java.lang.InterruptedException. This should not happen, but the thread will resume waiting for new work so there should be no adverse effects
- [11/Jan/2019:16:21:51 +0000] category=PLUGGABLE severity=NOTICE msgID=org.opends.messages.backend.370 msg=The backend userRoot is now taken offline
- [11/Jan/2019:16:21:51 +0000] category=CORE severity=NOTICE msgID=org.opends.messages.core.203 msg=The Directory Server is now stopped
- 16:21:52 01/11/19 Copying OpenDJ schema
- 16:21:52 01/11/19 Copied ./static/opendj/96-eduperson.ldif to /opt/opendj/config/schema
- 16:21:52 01/11/19 Copied ./static/opendj/101-ox.ldif to /opt/opendj/config/schema
- 16:21:52 01/11/19 Copied ./static/opendj/77-customAttributes.ldif to /opt/opendj/config/schema
- 16:21:52 01/11/19 Running: /bin/chmod -R a+rX /opt/opendj
- 16:21:52 01/11/19 Running: /bin/chown -R ldap:ldap /opt/opendj
- 16:21:52 01/11/19 Running: /opt/opendj/bin/create-rc-script --outputFile /etc/init.d/opendj --userName ldap
- 16:21:53 01/11/19 Running: /usr/sbin/update-rc.d opendj defaults start 40 30
- 16:21:53 01/11/19 Running: /usr/sbin/update-rc.d opendj enable
- 16:21:53 01/11/19 Running: /usr/sbin/service opendj start
- 16:25:18 01/11/19 The timeout of '200' seconds to start the server has been reached. You can
- use the argument '--timeout' to increase this timeout
- 16:25:18 01/11/19 Configuring OpenDJ
- 16:25:18 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-global-configuration-prop --set single-structural-objectclass-behavior:accept
- 16:25:20 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:20 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-attribute-syntax-prop --syntax-name "Directory String" --set allow-zero-length-values:true
- 16:25:21 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:21 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-password-policy-prop --policy-name "Default Password Policy" --set allow-pre-encoded-passwords:true
- 16:25:23 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:23 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-log-publisher-prop --publisher-name "File-Based Audit Logger" --set enabled:true
- 16:25:24 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:24 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw create-backend --backend-name site --set base-dn:o=site --type je --set enabled:true
- 16:25:26 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:26 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-connection-handler-prop --handler-name "LDAP Connection Handler" --set enabled:false
- 16:25:28 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:28 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-connection-handler-prop --handler-name "LDAPS Connection Handler" --set enabled:true --set listen-address:127.0.0.1
- 16:25:29 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:29 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-administration-connector-prop --set listen-address:127.0.0.1
- 16:25:31 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:31 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-access-control-handler-prop --remove global-aci:'(targetattr!="userPassword||authPassword||debugsearchindex||changes||changeNumber||changeType||changeTime||targetDN||newRDN||newSuperior||deleteOldRDN")(version 3.0; acl "Anonymous read access"; allow (read,search,compare) userdn="ldap:///anyone";)'
- 16:25:33 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:33 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-global-configuration-prop --set reject-unauthenticated-requests:true
- 16:25:34 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:34 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-password-policy-prop --policy-name "Default Password Policy" --set default-password-storage-scheme:"Salted SHA-512"
- 16:25:36 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:36 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw set-global-configuration-prop --set reject-unauthenticated-requests:true
- 16:25:38 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:38 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw create-plugin --plugin-name "Unique mail address" --type unique-attribute --set enabled:true --set base-dn:o=gluu --set type:mail
- 16:25:39 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:39 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig --trustAll --no-prompt --hostname localhost --port 4444 --bindDN "cn=directory manager" --bindPasswordFile /home/ldap/.pw create-plugin --plugin-name "Unique uid entry" --type unique-attribute --set enabled:true --set base-dn:o=gluu --set type:uid
- 16:25:41 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:41 01/11/19 Reading OpenDJ truststore
- 16:25:41 01/11/19 Exporting OpenDJ certificate
- 16:25:41 01/11/19 Running: /opt/jre/bin/keytool -exportcert -keystore /opt/opendj/config/truststore -storepass S44te2S0gZUJUQ8Y0DZrPKZKRsSTMA0fB1N4MvD8TwXXCTvoKB -file /etc/certs/opendj.crt -alias server-cert -rfc
- 16:25:41 01/11/19 Certificate stored in file </etc/certs/opendj.crt>
- 16:25:41 01/11/19 Converting OpenDJ truststore
- 16:25:41 01/11/19 Running: /opt/jre/bin/keytool -importkeystore -srckeystore /opt/opendj/config/truststore -srcstoretype jks -srcstorepass S44te2S0gZUJUQ8Y0DZrPKZKRsSTMA0fB1N4MvD8TwXXCTvoKB -destkeystore /etc/certs/opendj.pkcs12 -deststoretype pkcs12 -deststorepass UwnKYyZjZ7uo -srcalias server-cert
- 16:25:41 01/11/19 Importing keystore /opt/opendj/config/truststore to /etc/certs/opendj.pkcs12...
- 16:25:41 01/11/19 Import OpenDJ certificate
- 16:25:41 01/11/19 Running: /opt/jre/bin/keytool -import -trustcacerts -alias dev-auth.azya.io_opendj -file /etc/certs/opendj.crt -keystore /opt/jre/jre/lib/security/cacerts -storepass changeit -noprompt
- 16:25:42 01/11/19 Certificate was added to keystore
- 16:25:42 01/11/19 Running LDAP index creation commands for userRoot backend
- 16:25:42 01/11/19 Loading JSON from ./static/opendj/index.json
- 16:25:42 01/11/19 Creating equality index for attribute displayName
- 16:25:42 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name displayName --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:44 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:44 01/11/19 Creating equality index for attribute description
- 16:25:44 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name description --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:45 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:45 01/11/19 Creating equality index for attribute owner
- 16:25:45 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name owner --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:47 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:47 01/11/19 Creating equality index for attribute inum
- 16:25:47 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name inum --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:48 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:48 01/11/19 Creating equality index for attribute iname
- 16:25:48 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name iname --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:50 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:50 01/11/19 Creating equality index for attribute uniqueIdentifier
- 16:25:50 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name uniqueIdentifier --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:52 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:52 01/11/19 Creating equality index for attribute oxId
- 16:25:52 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxId --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:53 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:53 01/11/19 Creating equality index for attribute oxAuthClientId
- 16:25:53 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxAuthClientId --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:55 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:55 01/11/19 Creating ordering index for attribute oxAuthClientSecretExpiresAt
- 16:25:55 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxAuthClientSecretExpiresAt --set index-type:ordering --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:56 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:56 01/11/19 Creating equality index for attribute oxAuthGrantId
- 16:25:56 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxAuthGrantId --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:25:58 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:25:58 01/11/19 Creating equality index for attribute oxAuthAuthorizationCode
- 16:25:58 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxAuthAuthorizationCode --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:00 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:00 01/11/19 Creating equality index for attribute oxAuthTokenCode
- 16:26:00 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxAuthTokenCode --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:01 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:01 01/11/19 Creating equality index for attribute oxSectorIdentifier
- 16:26:01 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxSectorIdentifier --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:03 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:03 01/11/19 Creating equality index for attribute gluuStatus
- 16:26:03 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name gluuStatus --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:05 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:05 01/11/19 Creating equality index for attribute oxState
- 16:26:05 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxState --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:06 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:06 01/11/19 Creating equality index for attribute oxScriptType
- 16:26:06 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxScriptType --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:08 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:08 01/11/19 Creating ordering index for attribute oxAuthExpiration
- 16:26:08 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxAuthExpiration --set index-type:ordering --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:10 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:10 01/11/19 Creating ordering index for attribute oxLastAccessTime
- 16:26:10 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxLastAccessTime --set index-type:ordering --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:12 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:12 01/11/19 Creating ordering index for attribute lastModifiedTime
- 16:26:12 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name lastModifiedTime --set index-type:ordering --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:13 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:13 01/11/19 Creating equality index for attribute oxApplication
- 16:26:13 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxApplication --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:15 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:15 01/11/19 Creating equality index for attribute oxRequestId
- 16:26:15 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxRequestId --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:16 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:16 01/11/19 Creating ordering index for attribute creationDate
- 16:26:16 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name creationDate --set index-type:ordering --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:18 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:18 01/11/19 Creating ordering index for attribute oxStartDate
- 16:26:18 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxStartDate --set index-type:ordering --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:19 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:19 01/11/19 Creating ordering index for attribute oxEndDate
- 16:26:19 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxEndDate --set index-type:ordering --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:21 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:21 01/11/19 Creating equality index for attribute oxApplicationType
- 16:26:21 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxApplicationType --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:23 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:23 01/11/19 Creating equality index for attribute oxMetricType
- 16:26:23 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxMetricType --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:24 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:24 01/11/19 Creating equality index for attribute oxDeviceHashCode
- 16:26:24 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxDeviceHashCode --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:26 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:26 01/11/19 Creating equality index for attribute oxAuthSessionDn
- 16:26:26 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxAuthSessionDn --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:27 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:27 01/11/19 Creating equality index for attribute oxExternalUid
- 16:26:27 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxExternalUid --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:29 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:29 01/11/19 Creating equality index for attribute oxTicket
- 16:26:29 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name userRoot --type generic --index-name oxTicket --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:31 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:31 01/11/19 Running LDAP index creation commands for site backend
- 16:26:31 01/11/19 Loading JSON from ./static/opendj/index.json
- 16:26:31 01/11/19 Creating equality index for attribute inum
- 16:26:31 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name site --type generic --index-name inum --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:32 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:32 01/11/19 Creating equality index for attribute iname
- 16:26:32 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name site --type generic --index-name iname --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:34 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:34 01/11/19 Creating equality index for attribute gluuStatus
- 16:26:34 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name site --type generic --index-name gluuStatus --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:36 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:36 01/11/19 Creating equality index for attribute oxScriptType
- 16:26:36 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/dsconfig create-backend-index --backend-name site --type generic --index-name oxScriptType --set index-type:equality --set index-entry-limit:4000 --hostName localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --noPropertiesFile --no-prompt
- 16:26:37 01/11/19
- Unable to connect to the server at "localhost" on port 4444
- 16:26:37 01/11/19 Importing userRoot LDIF data
- 16:26:37 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/base.ldif
- 16:26:38 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:38 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/appliance.ldif
- 16:26:40 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:40 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/attributes.ldif
- 16:26:41 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:41 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/scopes.ldif
- 16:26:42 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:42 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/clients.ldif
- 16:26:44 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:44 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/people.ldif
- 16:26:45 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:45 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/groups.ldif
- 16:26:46 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:46 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/static/cache-refresh/o_site.ldif
- 16:26:47 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:47 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/scripts.ldif
- 16:26:48 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:48 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/configuration.ldif
- 16:26:50 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:50 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/scim.ldif
- 16:26:51 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:51 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/asimba.ldif
- 16:26:52 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:52 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/passport.ldif
- 16:26:53 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:53 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/oxpassport-config.ldif
- 16:26:55 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:55 01/11/19 Running: /bin/su ldap -c cd /opt/opendj/bin ; /opt/opendj/bin/ldapmodify --hostname localhost --port 4444 --bindDN "cn=directory manager" -j /home/ldap/.pw --trustAll --useSSL --defaultAdd --continueOnError --filename /install/community-edition-setup/output/oxidp.ldif
- 16:26:56 01/11/19 Connect Error
- Result Code: 91 (Connect Error)
- 16:26:56 01/11/19 Running: /usr/sbin/service apache2 stop
- 16:26:57 01/11/19 * Stopping Apache httpd web server apache2
- *
- 16:26:57 01/11/19 Copied ./output/https_gluu.conf to /etc/apache2/sites-available/https_gluu.conf
- 16:26:57 01/11/19 Running: /bin/ln -s /etc/apache2/sites-available/https_gluu.conf /etc/apache2/sites-enabled/https_gluu.conf
- 16:26:57 01/11/19 Running: /usr/sbin/service apache2 start
- 16:26:58 01/11/19 * Starting Apache httpd web server apache2
- *
- 16:26:59 01/11/19 Copying identity.war into jetty webapps folder...
- 16:26:59 01/11/19 Installing jetty service oxauth...
- 16:26:59 01/11/19 Preparing oxauth service base folders
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/oxauth
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/oxauth/lib/ext
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/oxauth/custom
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/oxauth/custom/i18n
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/oxauth/custom/pages
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/oxauth/custom/static
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/oxauth/custom/libs
- 16:26:59 01/11/19 Preparing oxauth service base configuration
- 16:26:59 01/11/19 Running: /opt/jre/bin/java -jar /opt/jetty/start.jar jetty.home=/opt/jetty jetty.base=/opt/gluu/jetty/oxauth --add-to-start=server,deploy,annotations,resources,http,http-forwarded,console-capture,jsp,ext,websocket
- 16:26:59 01/11/19 INFO : webapp transitively enabled, ini template available with --add-to-start=webapp
- INFO : ext initialized in ${jetty.base}/start.ini
- INFO : server initialized in ${jetty.base}/start.ini
- INFO : mail transitively enabled
- INFO : servlet transitively enabled
- INFO : jsp initialized in ${jetty.base}/start.ini
- INFO : http-forwarded initialized in ${jetty.base}/start.ini
- INFO : annotations initialized in ${jetty.base}/start.ini
- INFO : resources initialized in ${jetty.base}/start.ini
- INFO : transactions transitively enabled
- INFO : threadpool transitively enabled, ini template available with --add-to-start=threadpool
- INFO : plus transitively enabled
- INFO : deploy initialized in ${jetty.base}/start.ini
- INFO : security transitively enabled
- INFO : apache-jsp transitively enabled
- INFO : websocket initialized in ${jetty.base}/start.ini
- INFO : jndi transitively enabled
- INFO : console-capture initialized in ${jetty.base}/start.ini
- INFO : http initialized in ${jetty.base}/start.ini
- INFO : client transitively enabled
- MKDIR : ${jetty.base}/resources
- MKDIR : ${jetty.base}/webapps
- MKDIR : ${jetty.base}/logs
- INFO : Base directory was modified
- 16:26:59 01/11/19 Running: /bin/chown -R jetty:jetty /opt/gluu/jetty/oxauth
- 16:26:59 01/11/19 Rendering template oxauth
- 16:26:59 01/11/19 Copied ./output/jetty/oxauth to /etc/default
- 16:26:59 01/11/19 Running: /bin/chown root:root /etc/default/oxauth
- 16:26:59 01/11/19 Rendering template oxauth_web_resources.xml
- 16:26:59 01/11/19 Copied ./output/jetty/oxauth_web_resources.xml to /opt/gluu/jetty/oxauth/webapps
- 16:26:59 01/11/19 Copied /opt/jetty/bin/jetty.sh to /etc/init.d/oxauth
- 16:26:59 01/11/19 Running: sed -i s/^# Provides: jetty/# Provides: oxauth/ /etc/init.d/oxauth
- 16:26:59 01/11/19 Running: /usr/sbin/update-rc.d oxauth defaults 60 20
- 16:26:59 01/11/19 Creating 'jetty.conf' tmpfiles daemon file
- 16:26:59 01/11/19 Copied ./templates/jetty.conf.tmpfiles.d to /usr/lib/tmpfiles.d/jetty.conf
- 16:26:59 01/11/19 Running: /bin/chown root:root /usr/lib/tmpfiles.d/jetty.conf
- 16:26:59 01/11/19 Running: /bin/chmod 644 /usr/lib/tmpfiles.d/jetty.conf
- 16:26:59 01/11/19 Copied /opt/dist/gluu/oxauth.war to /opt/gluu/jetty/oxauth/webapps
- 16:26:59 01/11/19 Copying oxauth.war into jetty webapps folder...
- 16:26:59 01/11/19 Installing jetty service identity...
- 16:26:59 01/11/19 Preparing identity service base folders
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/identity
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/identity/lib/ext
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/identity/custom
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/identity/custom/i18n
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/identity/custom/pages
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/identity/custom/static
- 16:26:59 01/11/19 Running: /bin/mkdir -p /opt/gluu/jetty/identity/custom/libs
- 16:26:59 01/11/19 Preparing identity service base configuration
- 16:26:59 01/11/19 Running: /opt/jre/bin/java -jar /opt/jetty/start.jar jetty.home=/opt/jetty jetty.base=/opt/gluu/jetty/identity --add-to-start=server,deploy,annotations,resources,http,http-forwarded,console-capture,jsp,ext,websocket
- 16:27:00 01/11/19 INFO : webapp transitively enabled, ini template available with --add-to-start=webapp
- INFO : ext initialized in ${jetty.base}/start.ini
- INFO : server initialized in ${jetty.base}/start.ini
- INFO : mail transitively enabled
- INFO : servlet transitively enabled
- INFO : jsp initialized in ${jetty.base}/start.ini
- INFO : http-forwarded initialized in ${jetty.base}/start.ini
- INFO : annotations initialized in ${jetty.base}/start.ini
- INFO : resources initialized in ${jetty.base}/start.ini
- INFO : transactions transitively enabled
- INFO : threadpool transitively enabled, ini template available with --add-to-start=threadpool
- INFO : plus transitively enabled
- INFO : deploy initialized in ${jetty.base}/start.ini
- INFO : security transitively enabled
- INFO : apache-jsp transitively enabled
- INFO : websocket initialized in ${jetty.base}/start.ini
- INFO : jndi transitively enabled
- INFO : console-capture initialized in ${jetty.base}/start.ini
- INFO : http initialized in ${jetty.base}/start.ini
- INFO : client transitively enabled
- MKDIR : ${jetty.base}/resources
- MKDIR : ${jetty.base}/webapps
- MKDIR : ${jetty.base}/logs
- INFO : Base directory was modified
- 16:27:00 01/11/19 Running: /bin/chown -R jetty:jetty /opt/gluu/jetty/identity
- 16:27:00 01/11/19 Rendering template identity
- 16:27:00 01/11/19 Copied ./output/jetty/identity to /etc/default
- 16:27:00 01/11/19 Running: /bin/chown root:root /etc/default/identity
- 16:27:00 01/11/19 Rendering template identity_web_resources.xml
- 16:27:00 01/11/19 Copied ./output/jetty/identity_web_resources.xml to /opt/gluu/jetty/identity/webapps
- 16:27:00 01/11/19 Copied /opt/jetty/bin/jetty.sh to /etc/init.d/identity
- 16:27:00 01/11/19 Running: sed -i s/^# Provides: jetty/# Provides: identity/ /etc/init.d/identity
- 16:27:00 01/11/19 Running: /usr/sbin/update-rc.d identity defaults 60 20
- 16:27:00 01/11/19 Creating 'jetty.conf' tmpfiles daemon file
- 16:27:00 01/11/19 Copied ./templates/jetty.conf.tmpfiles.d to /usr/lib/tmpfiles.d/jetty.conf
- 16:27:00 01/11/19 Running: /bin/chown root:root /usr/lib/tmpfiles.d/jetty.conf
- 16:27:00 01/11/19 Running: /bin/chmod 644 /usr/lib/tmpfiles.d/jetty.conf
- 16:27:00 01/11/19 Copied /opt/dist/gluu/identity.war to /opt/gluu/jetty/identity/webapps
- 16:27:00 01/11/19 Rendering test templates
- 16:27:00 01/11/19 Rendering templates folder: ./templates/test/
- 16:27:00 01/11/19 Rendering test template ./templates/test/scim-client/client/config-scim-test.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/scim-client/schema/scim_test_manual_update.schema
- 16:27:00 01/11/19 Rendering test template ./templates/test/scim-client/schema/scim_test.schema
- 16:27:00 01/11/19 Rendering test template ./templates/test/scim-client/data/scim-test-data.ldif
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxtrust/server/config-oxtrust-test-data.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxtrust/server/config-build.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxtrust/server/config-oxtrust-test.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxtrust/server/config-oxtrust.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/client/config-oxauth-test-data.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/schema/oxauth_test.schema
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/server/config-build.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/server/config-oxauth.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/server/config-oxauth-test.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/server/config-oxauth-test-data.properties
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/config/oxauth-config-update.json
- 16:27:00 01/11/19 Rendering test template ./templates/test/oxauth/data/oxauth-test-data.ldif
- 16:27:00 01/11/19 Copied ./static/auth/lib/duo_web.py to /opt/gluu/python/libs
- 16:27:00 01/11/19 Copied ./static/auth/conf/duo_creds.json to /etc/certs/
- 16:27:00 01/11/19 Copied ./static/auth/conf/gplus_client_secrets.json to /etc/certs/
- 16:27:00 01/11/19 Copied ./static/auth/conf/super_gluu_creds.json to /etc/certs/
- 16:27:00 01/11/19 Copied ./static/auth/conf/vericloud_gluu_creds.json to /etc/certs/
- 16:27:00 01/11/19 Copied ./static/auth/conf/cert_creds.json to /etc/certs/
- 16:27:00 01/11/19 Copied ./static/auth/conf/otp_configuration.json to /etc/certs/
- 16:27:00 01/11/19 Changing ownership
- 16:27:00 01/11/19 Running: /bin/chown -R root:gluu /etc/certs
- 16:27:00 01/11/19 Running: /bin/chown -R root:gluu /etc/gluu/conf
- 16:27:00 01/11/19 Running: /bin/chown -R root:gluu /opt/gluu/python
- 16:27:00 01/11/19 Running: /bin/chown -R root:gluu /var/ox
- 16:27:00 01/11/19 Running: /bin/chmod -R 440 /etc/certs
- 16:27:00 01/11/19 Running: /bin/chmod a+X /etc/certs
- 16:27:00 01/11/19 Running: /bin/chmod u+w /etc/certs/asimbaIDP.jks
- 16:27:00 01/11/19 Running: /bin/chown -R jetty:jetty /etc/certs/oxauth-keys.json
- 16:27:00 01/11/19 Running: /bin/chown -R jetty:jetty /etc/certs/oxauth-keys.jks
- 16:27:01 01/11/19 Changing permissions
- 16:27:01 01/11/19 Running: find /opt -user root -perm 700 -exec chmod 755 {} ;
- 16:27:01 01/11/19 Running: find /opt -user root -perm 600 -exec chmod 644 {} ;
- 16:27:01 01/11/19 Running: find /opt -user root -perm 400 -exec chmod 444 {} ;
- 16:27:01 01/11/19 Running: find /etc/gluu -perm 700 -exec /bin/chmod 755 {} ;
- 16:27:01 01/11/19 Running: find /etc/gluu -perm 600 -exec /bin/chmod 644 {} ;
- 16:27:01 01/11/19 Running: find /etc/default -perm 700 -exec /bin/chmod 755 {} ;
- 16:27:01 01/11/19 Running: find /etc/default -perm 600 -exec /bin/chmod 644 {} ;
- 16:27:01 01/11/19 Running: /bin/chmod -R 644 /etc/hosts
- 16:27:01 01/11/19 Running: /bin/chmod -f 644 /etc/hostname
- 16:27:01 01/11/19 Running: /usr/sbin/service apache2 start
- 16:27:01 01/11/19 * Starting Apache httpd web server apache2
- *
- 16:27:01 01/11/19 Running: /usr/sbin/service opendj stop
- 16:30:26 01/11/19 Run: /usr/sbin/service opendj stop with result code: 91
- 16:30:26 01/11/19 Running: /usr/sbin/service opendj start
- 16:30:30 01/11/19 Run: /usr/sbin/service opendj start with result code: 98
- 16:30:30 01/11/19 Running: /usr/sbin/service oxauth start
- 16:30:43 01/11/19 Run: /usr/sbin/service oxauth start with result code: 0
- 16:30:43 01/11/19 Running: /usr/sbin/service identity start
- 16:30:55 01/11/19 Run: /usr/sbin/service identity start with result code: 0
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*passport /etc/rc3.d/S97passport
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*passport /etc/rc3.d/S97passport with result code: 1
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*idp /etc/rc3.d/S94idp
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*idp /etc/rc3.d/S94idp with result code: 1
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*oxauth-rp /etc/rc3.d/S95oxauth-rp
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*oxauth-rp /etc/rc3.d/S95oxauth-rp with result code: 1
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*oxauth /etc/rc3.d/S92oxauth
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*oxauth /etc/rc3.d/S92oxauth with result code: 0
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*solserver /etc/rc3.d/S90solserver
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*solserver /etc/rc3.d/S90solserver with result code: 1
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*asimba /etc/rc3.d/S96asimba
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*asimba /etc/rc3.d/S96asimba with result code: 1
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*opendj /etc/rc3.d/S90opendj
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*opendj /etc/rc3.d/S90opendj with result code: 0
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*identity /etc/rc3.d/S93identity
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*identity /etc/rc3.d/S93identity with result code: 0
- 16:30:55 01/11/19 Running: mv -f /etc/rc3.d/S*apache2 /etc/rc3.d/S98apache2
- 16:30:55 01/11/19 Run: mv -f /etc/rc3.d/S*apache2 /etc/rc3.d/S98apache2 with result code: 0
- 16:30:55 01/11/19 Saving properties to ./setup.properties.last
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement