3905 lines
990 KiB
Plaintext
3905 lines
990 KiB
Plaintext
2023-10-16 15:28:34,323 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:28:34,336 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.35 seconds (JVM running for 526.86)
|
|
2023-10-16 15:28:34,340 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:28:35,846 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:28:35,847 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:28:35,847 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:28:36,208 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6e698d575 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:36,239 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@21a9dba19 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:36,249 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:28:36,262 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:28:36,477 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:28:36,511 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:28:36,517 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:28:36,530 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:28:36,561 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:28:36,561 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:28:36,562 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:28:36,572 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@b6de7b4, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@4cd2d521, org.springframework.security.web.context.SecurityContextPersistenceFilter@726be089, org.springframework.security.web.header.HeaderWriterFilter@13488206, org.springframework.web.filter.CorsFilter@7ee1c04f, org.springframework.security.web.csrf.CsrfFilter@263bc916, org.springframework.security.web.authentication.logout.LogoutFilter@22886054, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4ba82337, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@1b2c098f, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@6d6543a3, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@5575d058, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@2fa2042, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@37c9cd45, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@1d6dd22, org.springframework.security.web.session.SessionManagementFilter@ae0ebba, org.springframework.security.web.access.ExceptionTranslationFilter@d454f8b, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@401b4f7f]
|
|
2023-10-16 15:28:36,579 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@2a55fe90
|
|
2023-10-16 15:28:36,580 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5f54f5285 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:36,612 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@155677579 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:36,615 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7266a5875 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:36,636 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@77c264259 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:36,771 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:28:36,772 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:28:36,893 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:28:36,903 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.086 seconds (JVM running for 529.426)
|
|
2023-10-16 15:28:36,905 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:28:40,366 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing POST /api/logout
|
|
2023-10-16 15:28:40,367 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:40,368 DEBUG [XNIO-24 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:40,368 DEBUG [XNIO-24 task-1] SessionManagementFilter: Request requested invalid session id MZgvAITUVYdiZVPFMS-SG37ftBfyl82rjml4ZKhO
|
|
2023-10-16 15:28:40,371 DEBUG [XNIO-24 task-1] FilterSecurityInterceptor: Failed to authorize filter invocation [POST /api/logout] with attributes [authenticated]
|
|
2023-10-16 15:28:40,374 WARN [XNIO-24 task-1] AdviceTraits: Unauthorized: Full authentication is required to access this resource
|
|
2023-10-16 15:28:40,381 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:28:40,382 WARN [XNIO-24 task-1] ExceptionHandlerExceptionResolver: Resolved [org.springframework.security.authentication.InsufficientAuthenticationException: Full authentication is required to access this resource]
|
|
2023-10-16 15:28:40,382 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:28:40,382 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,393 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing GET /oauth2/authorization/oidc
|
|
2023-10-16 15:28:40,393 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:40,394 DEBUG [XNIO-24 task-1] DefaultRedirectStrategy: Redirecting to https://accounts.dev.d4science.org/auth/realms/d4science/protocol/openid-connect/auth?response_type=code&client_id=pc-paratore.isti.cnr.it&scope=openid%20profile%20email%20phone%20offline_access&state=sFac9mQ3eS_Btg39Czn2VglaAjsigcgC4C2FeavYXhQ%3D&redirect_uri=http://localhost:8080/login/oauth2/code/oidc&nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ
|
|
2023-10-16 15:28:40,395 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:28:40,395 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:28:40,395 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,548 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing GET /login/oauth2/code/oidc?state=sFac9mQ3eS_Btg39Czn2VglaAjsigcgC4C2FeavYXhQ%3D&session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120&code=27a650ad-c0fa-4320-9e4d-df715db97569.c22d8e9a-50b4-485b-9d2c-54e99df59120.4f47f28a-2d6d-41e0-b695-f7b6c2ca83f9
|
|
2023-10-16 15:28:40,548 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:40,551 DEBUG [XNIO-24 task-1] HttpURLConnection: sun.net.www.MessageHeader@567f0e1c8 pairs: {POST /auth/realms/d4science/protocol/openid-connect/token HTTP/1.1: null}{Accept: application/json;charset=UTF-8}{Content-Type: application/x-www-form-urlencoded;charset=UTF-8}{Authorization: Basic cGMtcGFyYXRvcmUuaXN0aS5jbnIuaXQ6TGx5RlB0amxIZHY5NVBRM3diN3JZcDBQVlZESzJmTmo=}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}{Content-Length: 219}
|
|
2023-10-16 15:28:40,624 DEBUG [XNIO-24 task-1] HttpURLConnection: sun.net.www.MessageHeader@60eb5f2510 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-store}{x-content-type-options: nosniff}{pragma: no-cache}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 5077}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:40,627 DEBUG [XNIO-24 task-1] HttpURLConnection: sun.net.www.MessageHeader@2d542e385 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:40,650 DEBUG [XNIO-24 task-1] HttpURLConnection: sun.net.www.MessageHeader@168f26729 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:40,652 DEBUG [XNIO-24 task-1] HttpURLConnection: sun.net.www.MessageHeader@38aed5516 pairs: {GET /auth/realms/d4science/protocol/openid-connect/userinfo HTTP/1.1: null}{Accept: application/json}{Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.eyJleHAiOjE2OTc0NjQ3MjAsImlhdCI6MTY5NzQ2MjkyMCwiYXV0aF90aW1lIjoxNjk3NDYwMTE1LCJqdGkiOiJiYzU0ODRkNi1mOTMxLTQzMDEtYjc0My1kY2FiOTEyYzBiYzQiLCJpc3MiOiJodHRwczovL2FjY291bnRzLmRldi5kNHNjaWVuY2Uub3JnL2F1dGgvcmVhbG1zL2Q0c2NpZW5jZSIsImF1ZCI6WyIlMkZnY3ViZSIsIiUyRmdjdWJlJTJGZGV2c2VjIiwiJTJGZ2N1YmUlMkZkZXZOZXh0JTJGTmV4dE5leHQiLCIlMkZnY3ViZSUyRmRldnNlYyUyRmRldlZSRSIsIiUyRmdjdWJlJTJGZGV2TmV4dCIsImFjY291bnQiXSwic3ViIjoiNGRhZjI5YzAtZGY0MS00NDdhLTgwYjYtN2UzZWI2NjVlYTkwIiwidHlwIjoiQmVhcmVyIiwiYXpwIjoicGMtcGFyYXRvcmUuaXN0aS5jbnIuaXQiLCJub25jZSI6IjU5bGhLWEFqWlpVbWQxOTI4NTg3N0lsRTVRakgxREE0dXNfUnlhVHpicVEiLCJzZXNzaW9uX3N0YXRlIjoiYzIyZDhlOWEtNTBiNC00ODViLTlkMmMtNTRlOTlkZjU5MTIwIiwiYWxsb3dlZC1vcmlnaW5zIjpbIi8qIl0sInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJkZWZhdWx0LXJvbGVzLWQ0c2NpZW5jZSIsIm9mZmxpbmVfYWNjZXNzIiwidW1hX2F1dGhvcml6YXRpb24iXX0sInJlc291cmNlX2FjY2VzcyI6eyIlMkZnY3ViZSI6eyJyb2xlcyI6WyJNZW1iZXIiXX0sIiUyRmdjdWJlJTJGZGV2c2VjIjp7InJvbGVzIjpbIk1lbWJlciJdfSwiJTJGZ2N1YmUlMkZkZXZOZXh0JTJGTmV4dE5leHQiOnsicm9sZXMiOlsiTWVtYmVyIl19LCIlMkZnY3ViZSUyRmRldnNlYyUyRmRldlZSRSI6eyJyb2xlcyI6WyJDYXRhbG9ndWUtRWRpdG9yIiwiTWVtYmVyIl19LCIlMkZnY3ViZSUyRmRldk5leHQiOnsicm9sZXMiOlsiTWVtYmVyIl19LCJhY2NvdW50Ijp7InJvbGVzIjpbIm1hbmFnZS1hY2NvdW50IiwibWFuYWdlLWFjY291bnQtbGlua3MiLCJ2aWV3LXByb2ZpbGUiXX19LCJzY29wZSI6Im9wZW5pZCBwaG9uZSBlbWFpbCBvZmZsaW5lX2FjY2VzcyBwcm9maWxlIiwic2lkIjoiYzIyZDhlOWEtNTBiNC00ODViLTlkMmMtNTRlOTlkZjU5MTIwIiwiZW1haWxfdmVyaWZpZWQiOnRydWUsIm5hbWUiOiJNYXJpYSBUZXJlc2EgUGFyYXRvcmUiLCJwcmVmZXJyZWRfdXNlcm5hbWUiOiJtYXJpYXRlcmVzYS5wYXJhdG9yZSIsImdpdmVuX25hbWUiOiJNYXJpYSBUZXJlc2EiLCJmYW1pbHlfbmFtZSI6IlBhcmF0b3JlIiwiZW1haWwiOiJtYXJpYXRlcmVzYS5wYXJhdG9yZUBpc3RpLmNuci5pdCJ9.RmaShy8xuahIUrsGPgNxt0HVNnH48KfQ8bL9GjkgQN5JbeHNrH-p5Xg678ngFXIJYb-Lck7-zAHSIgf32430acq8DCYPd8XPzU0uWNBUv4nUf7UcSsMFXoiHDayjiyLjQT7jdW6fohsD38aNVwMxNygvtoMLAEorGWbEa5FJcdw-jx0WrzzutLRL07K20xl7_MmYag5Eov_l0XL2q8jKX7kf2lTGCRJ2Wi6kUW_HlpSeWFubRKADPLUan6eHt39DPfB0pYhbu5fa77E0-HRemoxex_I2KWPTrGdAwAJ_JPT3x_qwqOkOxzZjk0G-cyRGx3y7oGfbDyqbzPeH-GzoVg}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:40,677 DEBUG [XNIO-24 task-1] HttpURLConnection: sun.net.www.MessageHeader@206a7169 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 663}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:40,694 DEBUG [XNIO-24 task-1] SecurityConfiguration: Authorities: [ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]
|
|
2023-10-16 15:28:40,714 DEBUG [XNIO-24 task-1] SecurityConfiguration: Authority: ROLE_USER
|
|
2023-10-16 15:28:40,715 DEBUG [XNIO-24 task-1] SecurityConfiguration: TokenValue: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.VhGzGNGWmINveI1xoOVvYJPfTMkGNFEA2XyLVs2_oejhikdZB6gI5eZ-dVKIHtdf9fZ4iIe_Qshn_mnZFH_ASshn-6IeozpW6M5HNTg18eJT4Y-2RRVcuxhBUk7DVsa6WP0VNs64Jv5zEP7BIK4KLTXaUmNteqkPVbMTpMfAKA23Qyr9bS_ENwJ-D3kdj11uy9Sjv0Vbx35QSpOXXvNYqRynjvEwmOfJOqH90JtdN21IjOYd83snKoAw3-2Nuj1V2LMEvaVIlfNmYeIWu7KFpKa6L7owz9BAi9h0kRnQs5hPhgpKkCaFC5QDZn_K9JFKjvdjeCx78wkUnTkfOfRF3A
|
|
2023-10-16 15:28:40,735 DEBUG [XNIO-24 task-1] SecurityConfiguration: oidcUserAuthority: ROLE_USER
|
|
2023-10-16 15:28:40,736 DEBUG [XNIO-24 task-1] SecurityUtils: extractAuthorityFromClaims: {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 15:28:40,738 DEBUG [XNIO-24 task-1] SecurityUtils: getRolesFromClaims(): {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 15:28:40,739 DEBUG [XNIO-24 task-1] SecurityUtils: ResourceAccess: class java.util.LinkedHashMap
|
|
2023-10-16 15:28:40,760 INFO [XNIO-24 task-1] SecurityUtils: Default Scope: %2Fgcube
|
|
2023-10-16 15:28:40,760 INFO [XNIO-24 task-1] SecurityUtils: D4Science Roles: [Member]
|
|
2023-10-16 15:28:40,760 DEBUG [XNIO-24 task-1] SecurityUtils: mapRolesToGrantedAuthorities(): [Member]
|
|
2023-10-16 15:28:40,760 INFO [XNIO-24 task-1] SecurityUtils: GrantedAuthority: [ROLE_ADMIN]
|
|
2023-10-16 15:28:40,760 DEBUG [XNIO-24 task-1] SecurityConfiguration: Authority: SCOPE_email
|
|
2023-10-16 15:28:40,760 DEBUG [XNIO-24 task-1] SecurityConfiguration: Authority: SCOPE_offline_access
|
|
2023-10-16 15:28:40,761 DEBUG [XNIO-24 task-1] SecurityConfiguration: Authority: SCOPE_openid
|
|
2023-10-16 15:28:40,761 DEBUG [XNIO-24 task-1] SecurityConfiguration: Authority: SCOPE_phone
|
|
2023-10-16 15:28:40,761 DEBUG [XNIO-24 task-1] SecurityConfiguration: Authority: SCOPE_profile
|
|
2023-10-16 15:28:40,761 DEBUG [XNIO-24 task-1] ChangeSessionIdAuthenticationStrategy: Changed session id from ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg
|
|
2023-10-16 15:28:40,761 DEBUG [XNIO-24 task-1] CsrfAuthenticationStrategy: Replaced CSRF Token
|
|
2023-10-16 15:28:40,762 DEBUG [XNIO-24 task-1] OAuth2LoginAuthenticationFilter: Set SecurityContextHolder to OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]
|
|
2023-10-16 15:28:40,762 DEBUG [XNIO-24 task-1] DefaultRedirectStrategy: Redirecting to /
|
|
2023-10-16 15:28:40,762 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@ce8c1933]
|
|
2023-10-16 15:28:40,763 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@ce8c1933]
|
|
2023-10-16 15:28:40,763 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,766 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing GET /
|
|
2023-10-16 15:28:40,766 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,767 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,768 DEBUG [XNIO-24 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /]
|
|
2023-10-16 15:28:40,768 DEBUG [XNIO-24 task-1] FilterChainProxy: Secured GET /
|
|
2023-10-16 15:28:40,776 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,796 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing GET /content/css/loading.css
|
|
2023-10-16 15:28:40,797 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,797 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,798 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /styles.css
|
|
2023-10-16 15:28:40,798 DEBUG [XNIO-24 task-3] FilterChainProxy: Securing GET /runtime.js
|
|
2023-10-16 15:28:40,798 DEBUG [XNIO-24 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /content/css/loading.css] with attributes [permitAll]
|
|
2023-10-16 15:28:40,799 DEBUG [XNIO-24 task-1] FilterChainProxy: Secured GET /content/css/loading.css
|
|
2023-10-16 15:28:40,799 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,799 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /polyfills.js
|
|
2023-10-16 15:28:40,799 DEBUG [XNIO-24 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,799 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-5] FilterChainProxy: Securing GET /main.js
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /styles.css]
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /styles.css
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-5] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,800 DEBUG [XNIO-24 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /runtime.js]
|
|
2023-10-16 15:28:40,801 DEBUG [XNIO-24 task-3] FilterChainProxy: Secured GET /runtime.js
|
|
2023-10-16 15:28:40,801 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /polyfills.js]
|
|
2023-10-16 15:28:40,801 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,802 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /polyfills.js
|
|
2023-10-16 15:28:40,802 DEBUG [XNIO-24 task-5] FilterSecurityInterceptor: Authorized public object filter invocation [GET /main.js]
|
|
2023-10-16 15:28:40,802 DEBUG [XNIO-24 task-5] FilterChainProxy: Secured GET /main.js
|
|
2023-10-16 15:28:40,802 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,806 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,806 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,807 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,809 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,822 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:28:40,822 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,822 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,823 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /content/images/logo-jhipster.png] with attributes [permitAll]
|
|
2023-10-16 15:28:40,823 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:28:40,825 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:40,869 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:28:40,870 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,870 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:40,871 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_bootstrap_ts.js]
|
|
2023-10-16 15:28:40,871 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:28:40,895 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:41,160 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:28:41,161 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,161 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,162 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7] with attributes [permitAll]
|
|
2023-10-16 15:28:41,162 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:28:41,164 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:41,168 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 15:28:41,168 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,169 DEBUG [XNIO-24 task-5] FilterChainProxy: Securing GET /management/info
|
|
2023-10-16 15:28:41,169 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,169 DEBUG [XNIO-24 task-5] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,169 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,169 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 15:28:41,169 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 15:28:41,170 DEBUG [XNIO-24 task-5] FilterSecurityInterceptor: Authorized filter invocation [GET /management/info] with attributes [permitAll]
|
|
2023-10-16 15:28:41,170 DEBUG [XNIO-24 task-5] FilterChainProxy: Secured GET /management/info
|
|
2023-10-16 15:28:41,171 DEBUG [XNIO-24 task-4] AccountResource: Enter: getAccount() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,173 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:41,174 DEBUG [XNIO-24 task-4] UserService: Enter: getUserFromAuthentication() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,176 DEBUG [XNIO-24 task-4] UserService: AuthToken is a OAuth2AuthenticationToken
|
|
2023-10-16 15:28:41,176 DEBUG [XNIO-24 task-4] UserService: Attributes: {at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}
|
|
2023-10-16 15:28:41,177 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:41,177 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:41,177 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:41,177 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:41,177 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:41,178 DEBUG [XNIO-24 task-4] UserService: Exit: getUserFromAuthentication() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 15:28:41,179 DEBUG [XNIO-24 task-4] AccountResource: Exit: getAccount() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 15:28:41,186 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:41,230 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /logo-jhipster.png
|
|
2023-10-16 15:28:41,230 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,231 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:41,231 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /logo-jhipster.png]
|
|
2023-10-16 15:28:41,231 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /logo-jhipster.png
|
|
2023-10-16 15:28:41,233 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,074 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing POST /api/logout
|
|
2023-10-16 15:28:44,075 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:44,075 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=ViPx4SOF1Y4UtS3gZ2DTtA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=59lhKXAjZZUmd19285877IlE5QjH1DA4us_RyaTzbqQ, sid=c22d8e9a-50b4-485b-9d2c-54e99df59120, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T12:41:55Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:40Z, session_state=c22d8e9a-50b4-485b-9d2c-54e99df59120, family_name=Paratore, iat=2023-10-16T13:28:40Z, email=mariateresa.paratore@isti.cnr.it, jti=9ca70312-5cc6-43d6-8605-1ac5a472406a}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=ToqVWi1B9AHN8gBx-ooEGA6m8lDuEJrrRhUaeIpg], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:44,076 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [POST /api/logout] with attributes [authenticated]
|
|
2023-10-16 15:28:44,076 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured POST /api/logout
|
|
2023-10-16 15:28:44,079 DEBUG [XNIO-24 task-4] LogoutResource: Enter: logout() with argument[s] = [SecurityContextHolderAwareRequestWrapper[ org.springframework.security.web.header.HeaderWriterFilter$HeaderWriterRequest@3d81c797], org.springframework.security.oauth2.core.oidc.OidcIdToken@b9bcb710]
|
|
2023-10-16 15:28:44,082 DEBUG [XNIO-24 task-4] LogoutResource: Exit: logout() with result = <200 OK OK,{logoutUrl=https://accounts.dev.d4science.org/auth/realms/d4science/protocol/openid-connect/logout?id_token_hint=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.eyJleHAiOjE2OTc0NjQ3MjAsImlhdCI6MTY5NzQ2MjkyMCwiYXV0aF90aW1lIjoxNjk3NDYwMTE1LCJqdGkiOiI5Y2E3MDMxMi01Y2M2LTQzZDYtODYwNS0xYWM1YTQ3MjQwNmEiLCJpc3MiOiJodHRwczovL2FjY291bnRzLmRldi5kNHNjaWVuY2Uub3JnL2F1dGgvcmVhbG1zL2Q0c2NpZW5jZSIsImF1ZCI6InBjLXBhcmF0b3JlLmlzdGkuY25yLml0Iiwic3ViIjoiNGRhZjI5YzAtZGY0MS00NDdhLTgwYjYtN2UzZWI2NjVlYTkwIiwidHlwIjoiSUQiLCJhenAiOiJwYy1wYXJhdG9yZS5pc3RpLmNuci5pdCIsIm5vbmNlIjoiNTlsaEtYQWpaWlVtZDE5Mjg1ODc3SWxFNVFqSDFEQTR1c19SeWFUemJxUSIsInNlc3Npb25fc3RhdGUiOiJjMjJkOGU5YS01MGI0LTQ4NWItOWQyYy01NGU5OWRmNTkxMjAiLCJhdF9oYXNoIjoiVmlQeDRTT0YxWTRVdFMzZ1oyRFR0QSIsInNpZCI6ImMyMmQ4ZTlhLTUwYjQtNDg1Yi05ZDJjLTU0ZTk5ZGY1OTEyMCIsInJlc291cmNlX2FjY2VzcyI6eyIlMkZnY3ViZSI6eyJyb2xlcyI6WyJNZW1iZXIiXX0sIiUyRmdjdWJlJTJGZGV2c2VjIjp7InJvbGVzIjpbIk1lbWJlciJdfSwiJTJGZ2N1YmUlMkZkZXZOZXh0JTJGTmV4dE5leHQiOnsicm9sZXMiOlsiTWVtYmVyIl19LCIlMkZnY3ViZSUyRmRldnNlYyUyRmRldlZSRSI6eyJyb2xlcyI6WyJDYXRhbG9ndWUtRWRpdG9yIiwiTWVtYmVyIl19LCIlMkZnY3ViZSUyRmRldk5leHQiOnsicm9sZXMiOlsiTWVtYmVyIl19LCJhY2NvdW50Ijp7InJvbGVzIjpbIm1hbmFnZS1hY2NvdW50IiwibWFuYWdlLWFjY291bnQtbGlua3MiLCJ2aWV3LXByb2ZpbGUiXX19LCJlbWFpbF92ZXJpZmllZCI6dHJ1ZSwicmVhbG1fYWNjZXNzIjp7InJvbGVzIjpbImRlZmF1bHQtcm9sZXMtZDRzY2llbmNlIiwib2ZmbGluZV9hY2Nlc3MiLCJ1bWFfYXV0aG9yaXphdGlvbiJdfSwibmFtZSI6Ik1hcmlhIFRlcmVzYSBQYXJhdG9yZSIsInByZWZlcnJlZF91c2VybmFtZSI6Im1hcmlhdGVyZXNhLnBhcmF0b3JlIiwiZ2l2ZW5fbmFtZSI6Ik1hcmlhIFRlcmVzYSIsImZhbWlseV9uYW1lIjoiUGFyYXRvcmUiLCJlbWFpbCI6Im1hcmlhdGVyZXNhLnBhcmF0b3JlQGlzdGkuY25yLml0In0.VhGzGNGWmINveI1xoOVvYJPfTMkGNFEA2XyLVs2_oejhikdZB6gI5eZ-dVKIHtdf9fZ4iIe_Qshn_mnZFH_ASshn-6IeozpW6M5HNTg18eJT4Y-2RRVcuxhBUk7DVsa6WP0VNs64Jv5zEP7BIK4KLTXaUmNteqkPVbMTpMfAKA23Qyr9bS_ENwJ-D3kdj11uy9Sjv0Vbx35QSpOXXvNYqRynjvEwmOfJOqH90JtdN21IjOYd83snKoAw3-2Nuj1V2LMEvaVIlfNmYeIWu7KFpKa6L7owz9BAi9h0kRnQs5hPhgpKkCaFC5QDZn_K9JFKjvdjeCx78wkUnTkfOfRF3A&post_logout_redirect_uri=http://localhost:8080},[]>
|
|
2023-10-16 15:28:44,084 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: HttpSession is now null, but was not null at start of request; session was invalidated, so do not create a new session
|
|
2023-10-16 15:28:44,084 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: HttpSession is now null, but was not null at start of request; session was invalidated, so do not create a new session
|
|
2023-10-16 15:28:44,084 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,128 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /
|
|
2023-10-16 15:28:44,128 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,128 DEBUG [XNIO-24 task-4] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,129 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /]
|
|
2023-10-16 15:28:44,129 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /
|
|
2023-10-16 15:28:44,131 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,131 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,131 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,152 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /content/css/loading.css
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-5] FilterChainProxy: Securing GET /styles.css
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-3] FilterChainProxy: Securing GET /runtime.js
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-5] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-4] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-5] FilterSecurityInterceptor: Authorized public object filter invocation [GET /styles.css]
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-5] FilterChainProxy: Secured GET /styles.css
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /polyfills.js
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /content/css/loading.css] with attributes [permitAll]
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,153 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /content/css/loading.css
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /runtime.js]
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-3] FilterChainProxy: Secured GET /runtime.js
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing GET /main.js
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /polyfills.js]
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /polyfills.js
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /main.js]
|
|
2023-10-16 15:28:44,154 DEBUG [XNIO-24 task-1] FilterChainProxy: Secured GET /main.js
|
|
2023-10-16 15:28:44,155 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,155 DEBUG [XNIO-24 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,155 DEBUG [XNIO-24 task-5] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,155 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,155 DEBUG [XNIO-24 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,155 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,156 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,156 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,156 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,156 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,156 DEBUG [XNIO-24 task-5] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,157 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,157 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,162 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,162 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,178 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:28:44,178 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,178 DEBUG [XNIO-24 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,178 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /content/images/logo-jhipster.png] with attributes [permitAll]
|
|
2023-10-16 15:28:44,178 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:28:44,180 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,180 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,180 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,237 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:28:44,237 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,237 DEBUG [XNIO-24 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,238 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_bootstrap_ts.js]
|
|
2023-10-16 15:28:44,238 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:28:44,239 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,265 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,265 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,547 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:28:44,547 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,547 DEBUG [XNIO-24 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,547 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7] with attributes [permitAll]
|
|
2023-10-16 15:28:44,547 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:28:44,548 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,549 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,549 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,553 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 15:28:44,553 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-3] FilterChainProxy: Securing GET /management/info
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /management/info] with attributes [permitAll]
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-2] AccountResource: Enter: getAccount() with argument[s] = [null]
|
|
2023-10-16 15:28:44,554 DEBUG [XNIO-24 task-3] FilterChainProxy: Secured GET /management/info
|
|
2023-10-16 15:28:44,556 DEBUG [XNIO-24 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,556 ERROR [XNIO-24 task-2] AccountResource: Exception in getAccount() with cause = 'NULL' and exception = 'User could not be found'
|
|
org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$AccountResourceException: User could not be found
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource.getAccount(AccountResource.java:56)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$FastClassBySpringCGLIB$$b077edab.invoke(<generated>)
|
|
at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:793)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.AspectJAfterThrowingAdvice.invoke(AspectJAfterThrowingAdvice.java:64)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.MethodInvocationProceedingJoinPoint.proceed(MethodInvocationProceedingJoinPoint.java:89)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.aop.logging.LoggingAspect.logAround(LoggingAspect.java:105)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethodWithGivenArgs(AbstractAspectJAdvice.java:634)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethod(AbstractAspectJAdvice.java:624)
|
|
at org.springframework.aop.aspectj.AspectJAroundAdvice.invoke(AspectJAroundAdvice.java:72)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.interceptor.ExposeInvocationInterceptor.invoke(ExposeInvocationInterceptor.java:97)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:708)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$EnhancerBySpringCGLIB$$58dac763.getAccount(<generated>)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
|
|
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
|
|
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
|
|
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1070)
|
|
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
|
|
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
|
|
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:497)
|
|
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:584)
|
|
at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:74)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:129)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:111)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.filter.OAuth2RefreshTokensWebFilter.doFilterInternal(OAuth2RefreshTokensWebFilter.java:70)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:337)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:115)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:122)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:116)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:126)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter.doFilterInternal(OAuth2AuthorizationCodeGrantFilter.java:168)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:109)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:149)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:63)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:223)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:117)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.web.filter.CorsFilter.doFilterInternal(CorsFilter.java:91)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221)
|
|
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:354)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:267)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)
|
|
at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)
|
|
at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)
|
|
at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)
|
|
at io.undertow.servlet.handlers.RedirectDirHandler.handleRequest(RedirectDirHandler.java:68)
|
|
at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:117)
|
|
at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)
|
|
at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
|
|
at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java:60)
|
|
at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java:77)
|
|
at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SendErrorPageHandler.handleRequest(SendErrorPageHandler.java:52)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SessionRestoringHandler.handleRequest(SessionRestoringHandler.java:119)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:275)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:134)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:131)
|
|
at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)
|
|
at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:255)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:100)
|
|
at io.undertow.server.Connectors.executeRootHandler(Connectors.java:387)
|
|
at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:852)
|
|
at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
|
|
at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:2019)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1558)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1449)
|
|
at org.xnio.XnioWorker$WorkerThreadFactory$1$1.run(XnioWorker.java:1282)
|
|
at java.base/java.lang.Thread.run(Thread.java:829)
|
|
2023-10-16 15:28:44,559 DEBUG [XNIO-24 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,559 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,560 ERROR [XNIO-24 task-2] AdviceTraits: Internal Server Error
|
|
org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$AccountResourceException: User could not be found
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource.getAccount(AccountResource.java:56)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$FastClassBySpringCGLIB$$b077edab.invoke(<generated>)
|
|
at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:793)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.AspectJAfterThrowingAdvice.invoke(AspectJAfterThrowingAdvice.java:64)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.MethodInvocationProceedingJoinPoint.proceed(MethodInvocationProceedingJoinPoint.java:89)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.aop.logging.LoggingAspect.logAround(LoggingAspect.java:105)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethodWithGivenArgs(AbstractAspectJAdvice.java:634)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethod(AbstractAspectJAdvice.java:624)
|
|
at org.springframework.aop.aspectj.AspectJAroundAdvice.invoke(AspectJAroundAdvice.java:72)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.interceptor.ExposeInvocationInterceptor.invoke(ExposeInvocationInterceptor.java:97)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:708)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$EnhancerBySpringCGLIB$$58dac763.getAccount(<generated>)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
|
|
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
|
|
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
|
|
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1070)
|
|
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
|
|
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
|
|
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:497)
|
|
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:584)
|
|
at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:74)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:129)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:111)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.filter.OAuth2RefreshTokensWebFilter.doFilterInternal(OAuth2RefreshTokensWebFilter.java:70)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:337)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:115)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:122)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:116)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:126)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter.doFilterInternal(OAuth2AuthorizationCodeGrantFilter.java:168)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:109)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:149)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:63)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:223)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:117)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.web.filter.CorsFilter.doFilterInternal(CorsFilter.java:91)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221)
|
|
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:354)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:267)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)
|
|
at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)
|
|
at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)
|
|
at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)
|
|
at io.undertow.servlet.handlers.RedirectDirHandler.handleRequest(RedirectDirHandler.java:68)
|
|
at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:117)
|
|
at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)
|
|
at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
|
|
at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java:60)
|
|
at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java:77)
|
|
at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SendErrorPageHandler.handleRequest(SendErrorPageHandler.java:52)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SessionRestoringHandler.handleRequest(SessionRestoringHandler.java:119)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:275)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:134)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:131)
|
|
at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)
|
|
at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:255)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:100)
|
|
at io.undertow.server.Connectors.executeRootHandler(Connectors.java:387)
|
|
at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:852)
|
|
at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
|
|
at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:2019)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1558)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1449)
|
|
at org.xnio.XnioWorker$WorkerThreadFactory$1$1.run(XnioWorker.java:1282)
|
|
at java.base/java.lang.Thread.run(Thread.java:829)
|
|
2023-10-16 15:28:44,564 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,565 WARN [XNIO-24 task-2] ExceptionHandlerExceptionResolver: Resolved [org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$AccountResourceException: User could not be found]
|
|
2023-10-16 15:28:44,565 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,565 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:44,611 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /logo-jhipster.png
|
|
2023-10-16 15:28:44,611 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:44,612 DEBUG [XNIO-24 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:28:44,612 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /logo-jhipster.png]
|
|
2023-10-16 15:28:44,612 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /logo-jhipster.png
|
|
2023-10-16 15:28:44,613 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,614 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:28:44,614 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:46,715 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /oauth2/authorization/oidc
|
|
2023-10-16 15:28:46,715 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:46,716 DEBUG [XNIO-24 task-2] DefaultRedirectStrategy: Redirecting to https://accounts.dev.d4science.org/auth/realms/d4science/protocol/openid-connect/auth?response_type=code&client_id=pc-paratore.isti.cnr.it&scope=openid%20profile%20email%20phone%20offline_access&state=9yZZGrH9D6x7YvcvDEBn8CNyzFUqL-QPpCxtgWdV5UI%3D&redirect_uri=http://localhost:8080/login/oauth2/code/oidc&nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI
|
|
2023-10-16 15:28:46,716 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:28:46,716 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:28:46,716 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,571 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /login/oauth2/code/oidc?state=9yZZGrH9D6x7YvcvDEBn8CNyzFUqL-QPpCxtgWdV5UI%3D&session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3&code=39e012ff-2136-46d5-8419-9241347e0479.2b9d6128-7d9f-4c41-8984-fe01cd3723e3.4f47f28a-2d6d-41e0-b695-f7b6c2ca83f9
|
|
2023-10-16 15:28:48,571 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:28:48,619 DEBUG [XNIO-24 task-2] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:28:48,619 DEBUG [XNIO-24 task-2] HttpURLConnection: sun.net.www.MessageHeader@3fd4bb628 pairs: {POST /auth/realms/d4science/protocol/openid-connect/token HTTP/1.1: null}{Accept: application/json;charset=UTF-8}{Content-Type: application/x-www-form-urlencoded;charset=UTF-8}{Authorization: Basic cGMtcGFyYXRvcmUuaXN0aS5jbnIuaXQ6TGx5RlB0amxIZHY5NVBRM3diN3JZcDBQVlZESzJmTmo=}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}{Content-Length: 219}
|
|
2023-10-16 15:28:48,669 DEBUG [XNIO-24 task-2] HttpURLConnection: sun.net.www.MessageHeader@351ad57e10 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-store}{x-content-type-options: nosniff}{pragma: no-cache}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 5077}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:48,672 DEBUG [XNIO-24 task-2] HttpURLConnection: sun.net.www.MessageHeader@614dd4f16 pairs: {GET /auth/realms/d4science/protocol/openid-connect/userinfo HTTP/1.1: null}{Accept: application/json}{Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.YeCR3FJwBbcpn1_6w5cAa4O2BSHMvrPl430JLxZK5_mwC9kXFwE-qIbgXRTlfFiOY7w5uPAxnsaEXKvR5tl8104Ta4rRR5eyZ8xLJimm96uMoPKYpl1Zt_9H5llP9kTsOL_m6QjZRaFBpx0Lfj-EaZCc71G1fYnEdmSE8W2dL-tHT1uqY46x9aaq6VFxC8bHVbMK-3JqfyLXM71IeILYlp6t_wAkikeiJQfUUkdM13tL0lHkQNvGHszchJa3pxOwX3iLSMLqewvjZs0IXNUW1v1Q6wRbkpEIo66FgZwj82j0x0A3KcX0cjACxJvLW6vv0bIEJwokzsVHRJckzzUqJw}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:48,696 DEBUG [XNIO-24 task-2] HttpURLConnection: sun.net.www.MessageHeader@728919fc9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 663}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:48,697 DEBUG [XNIO-24 task-2] SecurityConfiguration: Authorities: [ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]
|
|
2023-10-16 15:28:48,697 DEBUG [XNIO-24 task-2] SecurityConfiguration: Authority: ROLE_USER
|
|
2023-10-16 15:28:48,698 DEBUG [XNIO-24 task-2] SecurityConfiguration: TokenValue: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.E5JezNbJBKvgeCNXL5eHDkfaFcH1MPguCpVV66I6JZn5jUHd9M2CUIGT_8qbcTm2lcDdNR21PUZaRAJ2PVHeiiV8EkqYgMMwKgEK2PLRWkKYSDdWgraImixxbSPYlu1XmGZDVJv6yyR1y_WiwNvSY_ELpuR4jQybGeJUGXvwMtPpLGDQK98zSHaeYDwJ1xtvf1YbRTwkthSGUEKnEXUef9VBLjrcZglmFpuiRn5WnBWybuDRZF6khkhwIVrZFZt0Og9C54cWgvr186ByTsY9t7aKBsSqGmule5Z2meqy88VHkiO4AM0bolxm8VsLs0tsq10TEtC8rmaohXbXcyLQaA
|
|
2023-10-16 15:28:48,698 DEBUG [XNIO-24 task-2] SecurityConfiguration: oidcUserAuthority: ROLE_USER
|
|
2023-10-16 15:28:48,698 DEBUG [XNIO-24 task-2] SecurityUtils: extractAuthorityFromClaims: {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 15:28:48,698 DEBUG [XNIO-24 task-2] SecurityUtils: getRolesFromClaims(): {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 15:28:48,698 DEBUG [XNIO-24 task-2] SecurityUtils: ResourceAccess: class java.util.LinkedHashMap
|
|
2023-10-16 15:28:48,698 INFO [XNIO-24 task-2] SecurityUtils: Default Scope: %2Fgcube
|
|
2023-10-16 15:28:48,699 INFO [XNIO-24 task-2] SecurityUtils: D4Science Roles: [Member]
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] SecurityUtils: mapRolesToGrantedAuthorities(): [Member]
|
|
2023-10-16 15:28:48,699 INFO [XNIO-24 task-2] SecurityUtils: GrantedAuthority: [ROLE_ADMIN]
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] SecurityConfiguration: Authority: SCOPE_email
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] SecurityConfiguration: Authority: SCOPE_offline_access
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] SecurityConfiguration: Authority: SCOPE_openid
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] SecurityConfiguration: Authority: SCOPE_phone
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] SecurityConfiguration: Authority: SCOPE_profile
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] ChangeSessionIdAuthenticationStrategy: Changed session id from UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN
|
|
2023-10-16 15:28:48,699 DEBUG [XNIO-24 task-2] CsrfAuthenticationStrategy: Replaced CSRF Token
|
|
2023-10-16 15:28:48,700 DEBUG [XNIO-24 task-2] OAuth2LoginAuthenticationFilter: Set SecurityContextHolder to OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]
|
|
2023-10-16 15:28:48,700 DEBUG [XNIO-24 task-2] DefaultRedirectStrategy: Redirecting to /
|
|
2023-10-16 15:28:48,700 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@3d83b390]
|
|
2023-10-16 15:28:48,701 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@3d83b390]
|
|
2023-10-16 15:28:48,701 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,703 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /
|
|
2023-10-16 15:28:48,704 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,704 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,705 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /]
|
|
2023-10-16 15:28:48,705 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /
|
|
2023-10-16 15:28:48,707 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,752 DEBUG [XNIO-24 task-2] FilterChainProxy: Securing GET /content/css/loading.css
|
|
2023-10-16 15:28:48,753 DEBUG [XNIO-24 task-3] FilterChainProxy: Securing GET /styles.css
|
|
2023-10-16 15:28:48,753 DEBUG [XNIO-24 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,753 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing GET /runtime.js
|
|
2023-10-16 15:28:48,753 DEBUG [XNIO-24 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,754 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,754 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /polyfills.js
|
|
2023-10-16 15:28:48,753 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,754 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /content/css/loading.css] with attributes [permitAll]
|
|
2023-10-16 15:28:48,754 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,754 DEBUG [XNIO-24 task-5] FilterChainProxy: Securing GET /main.js
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /styles.css]
|
|
2023-10-16 15:28:48,754 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-2] FilterChainProxy: Secured GET /content/css/loading.css
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /runtime.js]
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-5] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-1] FilterChainProxy: Secured GET /runtime.js
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-3] FilterChainProxy: Secured GET /styles.css
|
|
2023-10-16 15:28:48,755 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,756 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /polyfills.js]
|
|
2023-10-16 15:28:48,756 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,756 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /polyfills.js
|
|
2023-10-16 15:28:48,756 DEBUG [XNIO-24 task-5] FilterSecurityInterceptor: Authorized public object filter invocation [GET /main.js]
|
|
2023-10-16 15:28:48,757 DEBUG [XNIO-24 task-5] FilterChainProxy: Secured GET /main.js
|
|
2023-10-16 15:28:48,757 DEBUG [XNIO-24 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,758 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,758 DEBUG [XNIO-24 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,759 DEBUG [XNIO-24 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,761 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,781 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:28:48,781 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,781 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,782 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /content/images/logo-jhipster.png] with attributes [permitAll]
|
|
2023-10-16 15:28:48,782 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:28:48,784 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:48,832 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:28:48,832 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,833 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:48,833 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_bootstrap_ts.js]
|
|
2023-10-16 15:28:48,833 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:28:48,857 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:49,124 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:28:49,125 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,125 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,126 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7] with attributes [permitAll]
|
|
2023-10-16 15:28:49,126 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:28:49,128 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:49,131 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 15:28:49,132 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,132 DEBUG [XNIO-24 task-1] FilterChainProxy: Securing GET /management/info
|
|
2023-10-16 15:28:49,132 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,132 DEBUG [XNIO-24 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,133 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,133 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 15:28:49,133 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 15:28:49,133 DEBUG [XNIO-24 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /management/info] with attributes [permitAll]
|
|
2023-10-16 15:28:49,133 DEBUG [XNIO-24 task-1] FilterChainProxy: Secured GET /management/info
|
|
2023-10-16 15:28:49,134 DEBUG [XNIO-24 task-4] AccountResource: Enter: getAccount() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,134 DEBUG [XNIO-24 task-4] UserService: Enter: getUserFromAuthentication() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,134 DEBUG [XNIO-24 task-4] UserService: AuthToken is a OAuth2AuthenticationToken
|
|
2023-10-16 15:28:49,134 DEBUG [XNIO-24 task-4] UserService: Attributes: {at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}
|
|
2023-10-16 15:28:49,135 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:49,135 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:49,135 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:49,135 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:49,135 DEBUG [XNIO-24 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:49,135 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:49,135 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:49,136 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:49,136 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:49,136 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:49,136 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:49,136 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:28:49,136 DEBUG [XNIO-24 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:28:49,137 DEBUG [XNIO-24 task-4] UserService: Exit: getUserFromAuthentication() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 15:28:49,137 DEBUG [XNIO-24 task-4] AccountResource: Exit: getAccount() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 15:28:49,138 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:49,197 DEBUG [XNIO-24 task-4] FilterChainProxy: Securing GET /logo-jhipster.png
|
|
2023-10-16 15:28:49,197 DEBUG [XNIO-24 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,197 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=KIRdPF7cXzbJQeUPeNppVg, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=Eslj8xtv3_rt5Q8oBQ388HpVHHrOq_kTMY6yJnh4XZI, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T13:58:48Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:28:48Z, email=mariateresa.paratore@isti.cnr.it, jti=652ed100-32ba-4c59-934d-a23b07224b68}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=UIrJ0r--Sq3HRmcN6Q2_04wUOC0tYT8-oD10cXzN], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:28:49,198 DEBUG [XNIO-24 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /logo-jhipster.png]
|
|
2023-10-16 15:28:49,198 DEBUG [XNIO-24 task-4] FilterChainProxy: Secured GET /logo-jhipster.png
|
|
2023-10-16 15:28:49,199 DEBUG [XNIO-24 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:28:52,652 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:28:52,652 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:28:52,652 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:28:53,158 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@432d37015 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:53,190 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@51ac86b79 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:53,202 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:28:53,216 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:28:53,448 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:28:53,468 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:28:53,473 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:28:53,484 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:28:53,510 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:28:53,511 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:28:53,511 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:28:53,511 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:28:53,511 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:28:53,511 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:28:53,520 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@45b1bd28, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@1217f856, org.springframework.security.web.context.SecurityContextPersistenceFilter@4e9a413e, org.springframework.security.web.header.HeaderWriterFilter@2841ac5a, org.springframework.web.filter.CorsFilter@2eab528c, org.springframework.security.web.csrf.CsrfFilter@7c108895, org.springframework.security.web.authentication.logout.LogoutFilter@439fe086, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@1c1039f5, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4f34d742, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@47121c74, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@7dbd65eb, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@583b257a, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@7b70b391, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@5873f842, org.springframework.security.web.session.SessionManagementFilter@36b6335d, org.springframework.security.web.access.ExceptionTranslationFilter@799941bf, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@30e4f690]
|
|
2023-10-16 15:28:53,527 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@37d7fe7f
|
|
2023-10-16 15:28:53,528 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@42892b6d5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:53,560 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5a7c19d49 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:53,563 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@360aecdb5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:53,586 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3e26d8639 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:53,721 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:28:53,722 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:28:53,846 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:28:53,856 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.249 seconds (JVM running for 546.38)
|
|
2023-10-16 15:28:53,859 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:28:56,409 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:28:56,410 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:28:56,410 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:28:56,888 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7d8208ea5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:56,911 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@907b90a9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:56,924 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:28:56,941 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:28:57,284 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:28:57,321 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:28:57,327 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:28:57,343 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:28:57,384 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:28:57,385 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:28:57,385 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:28:57,396 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@5bf2a9ce, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@33ecd866, org.springframework.security.web.context.SecurityContextPersistenceFilter@75726eef, org.springframework.security.web.header.HeaderWriterFilter@37c5afb5, org.springframework.web.filter.CorsFilter@69aa377, org.springframework.security.web.csrf.CsrfFilter@3cb9103c, org.springframework.security.web.authentication.logout.LogoutFilter@6bef6139, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@28684805, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@7199d298, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@4e94cc4a, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@63d45715, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@79f6e4dd, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@c5ec191, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@3130e78d, org.springframework.security.web.session.SessionManagementFilter@13ea604, org.springframework.security.web.access.ExceptionTranslationFilter@664e1fd3, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@337e72f4]
|
|
2023-10-16 15:28:57,407 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@233978f6
|
|
2023-10-16 15:28:57,409 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@25a7c2f45 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:57,442 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@59e3f0109 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:57,445 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@643346a5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:57,467 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6ed5029c9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:57,661 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:28:57,662 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:28:57,851 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:28:57,865 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.493 seconds (JVM running for 550.388)
|
|
2023-10-16 15:28:57,869 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:28:59,364 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:28:59,364 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:28:59,364 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:28:59,857 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1664aa5c5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:28:59,889 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@16f4763d9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:28:59,906 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:28:59,923 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:00,232 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:00,262 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:00,270 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:00,285 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:00,320 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:00,321 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:00,322 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:00,334 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@60c2046c, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@13b9712, org.springframework.security.web.context.SecurityContextPersistenceFilter@5db2624, org.springframework.security.web.header.HeaderWriterFilter@5166722f, org.springframework.web.filter.CorsFilter@524b9281, org.springframework.security.web.csrf.CsrfFilter@3c41c78c, org.springframework.security.web.authentication.logout.LogoutFilter@ad7f19b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@22feb53, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@77f5dbc0, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@79e30f61, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2427377d, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@46b2dedc, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@5849672e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@1d4a11e5, org.springframework.security.web.session.SessionManagementFilter@3714eaed, org.springframework.security.web.access.ExceptionTranslationFilter@60b83cae, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@345bd1da]
|
|
2023-10-16 15:29:00,343 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@6de71ee0
|
|
2023-10-16 15:29:00,343 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4ce41f075 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:00,375 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1386b2089 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:00,378 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5834f58c5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:00,404 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@df1f0749 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:00,568 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:00,569 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:00,764 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:00,777 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.446 seconds (JVM running for 553.301)
|
|
2023-10-16 15:29:00,783 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:03,330 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:03,331 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:03,331 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:03,976 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1861d9e75 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:04,011 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@35230fd89 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:04,034 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:04,060 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:04,450 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:04,498 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:04,510 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:04,528 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:04,570 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:04,571 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:04,572 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:04,572 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:04,572 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:04,572 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:04,572 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:04,596 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@2ac1984e, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@62e9c514, org.springframework.security.web.context.SecurityContextPersistenceFilter@7ee96fc1, org.springframework.security.web.header.HeaderWriterFilter@5770f6dc, org.springframework.web.filter.CorsFilter@775c639e, org.springframework.security.web.csrf.CsrfFilter@51d5405d, org.springframework.security.web.authentication.logout.LogoutFilter@5b731a3, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@9401bd5, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@157539fd, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@4721e83a, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@4def3c23, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@1df9f554, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@5e6fa265, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@23d6a152, org.springframework.security.web.session.SessionManagementFilter@5c5108c, org.springframework.security.web.access.ExceptionTranslationFilter@497f4946, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59edef1e]
|
|
2023-10-16 15:29:04,616 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@1043adcd
|
|
2023-10-16 15:29:04,617 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@38e931385 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:04,648 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@56983af09 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:04,650 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@55bbaab85 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:04,672 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@581b48079 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:04,901 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:04,902 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:05,152 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:05,165 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.87 seconds (JVM running for 557.689)
|
|
2023-10-16 15:29:05,168 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:07,105 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:07,106 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:07,106 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:07,681 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5f6816305 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:07,713 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@8cd70449 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:07,726 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:07,741 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:08,089 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:08,121 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:08,128 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:08,141 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:08,182 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:08,183 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:08,184 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:08,184 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:08,184 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:08,184 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:08,184 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:08,196 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@2bc4264, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@6cd89137, org.springframework.security.web.context.SecurityContextPersistenceFilter@30e95f0b, org.springframework.security.web.header.HeaderWriterFilter@4f50afb7, org.springframework.web.filter.CorsFilter@6049c53, org.springframework.security.web.csrf.CsrfFilter@3fd861e5, org.springframework.security.web.authentication.logout.LogoutFilter@1133b59d, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@733f4975, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@3170cabf, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@6f80214d, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@7b66ae19, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@31819bd5, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@5bca8b21, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@b41d698, org.springframework.security.web.session.SessionManagementFilter@4cc2d83f, org.springframework.security.web.access.ExceptionTranslationFilter@255dd33c, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@487c188]
|
|
2023-10-16 15:29:08,205 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@4c156b1b
|
|
2023-10-16 15:29:08,206 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@fea292d5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:08,229 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@43b80b6b9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:08,233 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@453a2bff5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:08,254 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2210ddf09 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:08,523 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:08,525 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:08,745 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:08,760 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.631 seconds (JVM running for 561.225)
|
|
2023-10-16 15:29:08,775 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:10,304 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:10,304 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:10,304 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:10,806 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@807e5685 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:10,837 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@47035de89 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:10,851 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:10,873 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:11,228 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:11,281 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:11,293 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:11,311 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:11,369 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:11,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:11,384 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@1f6d417d, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@4c51f4c4, org.springframework.security.web.context.SecurityContextPersistenceFilter@1ff797e5, org.springframework.security.web.header.HeaderWriterFilter@26e302c9, org.springframework.web.filter.CorsFilter@33cab05a, org.springframework.security.web.csrf.CsrfFilter@1e73a59, org.springframework.security.web.authentication.logout.LogoutFilter@c2b2f5e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2744b63c, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@8cce3db, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@4ee3b18d, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@642166cb, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5aeac5cc, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@236c14ae, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@1d1af1b4, org.springframework.security.web.session.SessionManagementFilter@27fa44b1, org.springframework.security.web.access.ExceptionTranslationFilter@7611b79f, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@264670b6]
|
|
2023-10-16 15:29:11,396 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@6e66cd22
|
|
2023-10-16 15:29:11,396 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6e5907315 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:11,427 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@622c4af79 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:11,430 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@48c9cb165 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:11,452 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@101e10f09 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:11,718 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:11,722 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:12,015 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:12,030 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.761 seconds (JVM running for 564.496)
|
|
2023-10-16 15:29:12,034 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:13,610 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:13,611 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:13,611 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:14,151 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@23bedfdc5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:14,183 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1002201a9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:14,208 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:14,230 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:14,640 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:14,740 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:14,761 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:14,784 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:14,836 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:14,837 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:14,838 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:14,838 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:14,838 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:14,838 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:14,838 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:14,838 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:14,838 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:14,858 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@1fd03abd, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@3872e81e, org.springframework.security.web.context.SecurityContextPersistenceFilter@4720b927, org.springframework.security.web.header.HeaderWriterFilter@3e98324c, org.springframework.web.filter.CorsFilter@1de71963, org.springframework.security.web.csrf.CsrfFilter@6adc2b5f, org.springframework.security.web.authentication.logout.LogoutFilter@e46d88d, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@686e9bb6, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4abd9499, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@e653c0d, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@10bf7ffd, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@6f4a25f4, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@1ecdaad5, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@3ffb25f, org.springframework.security.web.session.SessionManagementFilter@4c2de52e, org.springframework.security.web.access.ExceptionTranslationFilter@39fdd6a8, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@19ea0c35]
|
|
2023-10-16 15:29:14,873 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@59fa78c6
|
|
2023-10-16 15:29:14,874 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@735280f15 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:14,906 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@634fef819 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:14,908 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4da7ac3f5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:14,930 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4711d1059 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:15,147 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:15,148 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:15,350 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:15,365 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.797 seconds (JVM running for 567.831)
|
|
2023-10-16 15:29:15,380 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:16,900 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:16,900 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:16,900 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:17,566 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4c0621f45 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:17,605 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@50e3ef159 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:17,620 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:17,645 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:18,078 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:18,138 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:18,158 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:18,180 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:18,244 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:18,245 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:18,246 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:18,270 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@666c85b7, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@714c2c88, org.springframework.security.web.context.SecurityContextPersistenceFilter@18b5bd5, org.springframework.security.web.header.HeaderWriterFilter@3b1f38a9, org.springframework.web.filter.CorsFilter@1177d4e5, org.springframework.security.web.csrf.CsrfFilter@6ad0b7e5, org.springframework.security.web.authentication.logout.LogoutFilter@47484553, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2894acb9, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2aea07e0, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@172012e0, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@6d553ccf, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@2f4d8bbc, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@be3e046, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@6b100d08, org.springframework.security.web.session.SessionManagementFilter@6e0bb66e, org.springframework.security.web.access.ExceptionTranslationFilter@2119a57e, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@38df3c81]
|
|
2023-10-16 15:29:18,282 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@52bddbde
|
|
2023-10-16 15:29:18,282 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@565e3bf15 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:18,305 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7a1ac4ca9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:18,308 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@18a6b0365 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:18,329 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2479fbd79 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:18,607 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:18,608 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:18,829 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:18,843 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.98 seconds (JVM running for 571.309)
|
|
2023-10-16 15:29:18,847 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:20,389 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:20,389 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:20,389 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:20,874 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@295d9fe95 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:20,906 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@652123d09 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:20,930 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:20,949 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:21,320 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:21,352 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:21,358 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:21,373 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:21,424 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:21,425 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:21,426 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:21,439 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@5f09e1df, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@1566af9d, org.springframework.security.web.context.SecurityContextPersistenceFilter@55159ce5, org.springframework.security.web.header.HeaderWriterFilter@46a859f9, org.springframework.web.filter.CorsFilter@162656e3, org.springframework.security.web.csrf.CsrfFilter@246c8991, org.springframework.security.web.authentication.logout.LogoutFilter@27c715ef, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@44d48329, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@9b1d719, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@71e76853, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@629c52bf, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@66ffa884, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@1268bb37, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@3f24e0d9, org.springframework.security.web.session.SessionManagementFilter@15f5bfcb, org.springframework.security.web.access.ExceptionTranslationFilter@44ee7a12, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@52cc9df3]
|
|
2023-10-16 15:29:21,451 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@1fbf3516
|
|
2023-10-16 15:29:21,452 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@48f9bc5b5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:21,476 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@21967f3d9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:21,479 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@263976245 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:21,500 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@40c8e0709 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:21,682 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:21,683 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:21,859 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:21,872 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.52 seconds (JVM running for 574.338)
|
|
2023-10-16 15:29:21,875 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:23,400 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:23,400 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:23,400 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:23,717 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@307181905 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:23,748 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3e7612079 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:23,757 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:23,775 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:23,991 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:24,012 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:24,016 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:24,027 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:24,056 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:24,056 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:24,056 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:24,056 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:24,056 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:24,056 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:24,057 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:24,066 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@6b3e3c5d, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@e3c9ed, org.springframework.security.web.context.SecurityContextPersistenceFilter@4af3fda9, org.springframework.security.web.header.HeaderWriterFilter@74b994a6, org.springframework.web.filter.CorsFilter@28f5c813, org.springframework.security.web.csrf.CsrfFilter@7d67b336, org.springframework.security.web.authentication.logout.LogoutFilter@6d2cf04b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@13c26532, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@690a3025, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@5f869609, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@62e21931, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5ac6bd6f, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@38505acc, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@6bd53fe0, org.springframework.security.web.session.SessionManagementFilter@a4d01d5, org.springframework.security.web.access.ExceptionTranslationFilter@469dc492, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@66087bb]
|
|
2023-10-16 15:29:24,074 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@7b93d30e
|
|
2023-10-16 15:29:24,074 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3742b3cd5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:24,111 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6a0247989 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:24,114 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3b5b22d85 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:24,137 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5e359d1e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:24,272 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:24,273 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:24,394 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:24,404 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.032 seconds (JVM running for 576.87)
|
|
2023-10-16 15:29:24,406 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:33,037 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:33,038 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:33,038 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:33,520 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:29:33,522 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@b4274215 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:33,548 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@726fd3479 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:33,572 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:33,599 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:33,991 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:34,029 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:34,036 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:34,052 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:34,093 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:34,094 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:34,094 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:34,094 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:34,094 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:34,094 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:34,094 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:34,106 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@1abd4273, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@5ba263d2, org.springframework.security.web.context.SecurityContextPersistenceFilter@8f61dce, org.springframework.security.web.header.HeaderWriterFilter@169f505, org.springframework.web.filter.CorsFilter@3bb988ea, org.springframework.security.web.csrf.CsrfFilter@265af36a, org.springframework.security.web.authentication.logout.LogoutFilter@57b29e07, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@70d21260, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@34627bb7, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@103a2c8a, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@6b902cf8, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@259f2d52, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@7cba14d2, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@7a1c0e42, org.springframework.security.web.session.SessionManagementFilter@79c6703f, org.springframework.security.web.access.ExceptionTranslationFilter@96d4d0d, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@629032a]
|
|
2023-10-16 15:29:34,116 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@4ae77486
|
|
2023-10-16 15:29:34,117 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@736ca2b65 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:34,143 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@12ca893e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:34,147 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7f9daefc5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:34,165 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@eafa6cd9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:34,351 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:34,352 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:34,528 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:34,542 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.547 seconds (JVM running for 587.007)
|
|
2023-10-16 15:29:34,545 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:36,598 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:36,598 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:36,598 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:37,075 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@192353345 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:37,101 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@34468c9e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:37,132 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:37,158 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:37,438 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:37,465 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:37,470 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:37,483 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:37,514 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:37,515 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:37,515 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:37,515 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:37,525 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@3b763950, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@7eedc73b, org.springframework.security.web.context.SecurityContextPersistenceFilter@1e40bce7, org.springframework.security.web.header.HeaderWriterFilter@7b5dd277, org.springframework.web.filter.CorsFilter@2d31d104, org.springframework.security.web.csrf.CsrfFilter@c3f7c0, org.springframework.security.web.authentication.logout.LogoutFilter@5b516254, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@1f8ad2ae, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@69735cd7, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@78e7a732, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@45b3ec6e, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@506840c5, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@d8ba9d5, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@72209a18, org.springframework.security.web.session.SessionManagementFilter@1a236e4, org.springframework.security.web.access.ExceptionTranslationFilter@52f13b2a, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@235713e2]
|
|
2023-10-16 15:29:37,532 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@50ea10f3
|
|
2023-10-16 15:29:37,533 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1a721da5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:37,559 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@512a5a5d9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:37,562 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@40154575 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:37,580 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@46ca1ac9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:37,719 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:37,720 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:37,874 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:37,887 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.333 seconds (JVM running for 590.352)
|
|
2023-10-16 15:29:37,889 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:42,460 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:42,460 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:42,460 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:42,891 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:29:42,891 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@cf392d05 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:42,925 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5ec81fd59 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:42,938 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:42,953 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:43,187 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:43,215 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:43,222 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:43,236 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:43,272 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:43,272 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:43,272 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:43,272 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:43,272 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:43,272 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:43,273 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:43,285 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@519cdcbb, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@2e9992c8, org.springframework.security.web.context.SecurityContextPersistenceFilter@281986ff, org.springframework.security.web.header.HeaderWriterFilter@77777651, org.springframework.web.filter.CorsFilter@65fe70e1, org.springframework.security.web.csrf.CsrfFilter@51bc15b, org.springframework.security.web.authentication.logout.LogoutFilter@1576f6ad, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4d6f6024, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2b202696, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@158d4efe, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@528ff7ca, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@1e06d634, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@427051b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@67c4fe27, org.springframework.security.web.session.SessionManagementFilter@735380d7, org.springframework.security.web.access.ExceptionTranslationFilter@112d682e, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@47016530]
|
|
2023-10-16 15:29:43,294 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@552ec02d
|
|
2023-10-16 15:29:43,295 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1b56ba575 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:43,319 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@75dd83cc9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:43,322 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@c0651315 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:43,339 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2f0ad7349 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:43,504 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:43,505 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:43,648 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:43,659 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.234 seconds (JVM running for 596.124)
|
|
2023-10-16 15:29:43,662 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:29:58,391 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:29:58,391 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:29:58,391 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:29:58,880 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:29:58,881 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@32871175 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:58,904 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4ce15d299 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:58,916 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:29:58,932 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:29:59,198 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:29:59,225 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:29:59,230 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:29:59,244 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:29:59,283 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:29:59,283 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:29:59,283 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:29:59,283 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:29:59,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:29:59,297 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@7021f202, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@6149e4d7, org.springframework.security.web.context.SecurityContextPersistenceFilter@a9bcf23, org.springframework.security.web.header.HeaderWriterFilter@42e7ac6b, org.springframework.web.filter.CorsFilter@b606b8, org.springframework.security.web.csrf.CsrfFilter@536893, org.springframework.security.web.authentication.logout.LogoutFilter@5614fa29, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@47169d6e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@37864ed, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@12f06130, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@55354eb1, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@2ace2488, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@2156ab1f, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@3afe2f4, org.springframework.security.web.session.SessionManagementFilter@11173a62, org.springframework.security.web.access.ExceptionTranslationFilter@1cf87130, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@539a79b7]
|
|
2023-10-16 15:29:59,311 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@769764a1
|
|
2023-10-16 15:29:59,311 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4c5d502c5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:59,338 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2dcdb1159 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:59,341 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6bc21e135 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:29:59,358 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@26bddda69 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:29:59,549 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:29:59,550 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:29:59,745 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:29:59,757 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.413 seconds (JVM running for 612.223)
|
|
2023-10-16 15:29:59,760 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:30:05,337 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:30:05,337 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:30:05,337 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:30:05,673 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:30:05,674 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1d17eda75 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:05,698 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@b300fbd9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:05,721 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:30:05,736 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:30:05,984 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:30:06,005 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:30:06,009 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:30:06,020 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:30:06,046 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:30:06,047 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:30:06,047 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:30:06,047 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:30:06,047 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:30:06,047 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:30:06,047 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:30:06,056 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@1db9be7f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@277ad993, org.springframework.security.web.context.SecurityContextPersistenceFilter@173021a4, org.springframework.security.web.header.HeaderWriterFilter@5e39c1e8, org.springframework.web.filter.CorsFilter@4ac8bb4, org.springframework.security.web.csrf.CsrfFilter@3940842a, org.springframework.security.web.authentication.logout.LogoutFilter@50690e51, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@46a11b2b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@7ad068bb, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@23132d46, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@184e52ff, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@868f69f, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@5e96e877, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@530f9f76, org.springframework.security.web.session.SessionManagementFilter@2aec9107, org.springframework.security.web.access.ExceptionTranslationFilter@2cb478ad, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@3b425689]
|
|
2023-10-16 15:30:06,064 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@ec385c3
|
|
2023-10-16 15:30:06,064 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@489dbebe5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:06,090 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1c3e0f469 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:06,092 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@38eadc215 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:06,108 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2a15ab629 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:06,246 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:30:06,246 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:30:06,381 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:30:06,395 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.09 seconds (JVM running for 618.86)
|
|
2023-10-16 15:30:06,397 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:30:26,210 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:30:26,210 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:30:26,210 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:30:26,645 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:30:26,645 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5dbf81435 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:26,670 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1c406e3d9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:26,692 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:30:26,709 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:30:26,978 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:30:27,005 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:30:27,012 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:30:27,026 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:30:27,061 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:30:27,061 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:30:27,061 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:30:27,061 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:30:27,061 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:30:27,061 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:30:27,061 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:30:27,062 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:30:27,074 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@1b2231d1, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@2fadc766, org.springframework.security.web.context.SecurityContextPersistenceFilter@57115708, org.springframework.security.web.header.HeaderWriterFilter@34963a95, org.springframework.web.filter.CorsFilter@4fe2d4dc, org.springframework.security.web.csrf.CsrfFilter@32279804, org.springframework.security.web.authentication.logout.LogoutFilter@5755f6a2, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@5b9b40a9, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@6b8e5148, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@498fa69d, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@169b2616, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@135ce4c2, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@3630d7ca, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@1a3db437, org.springframework.security.web.session.SessionManagementFilter@5978039b, org.springframework.security.web.access.ExceptionTranslationFilter@bc9405c, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@6d139a34]
|
|
2023-10-16 15:30:27,084 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@49a8d503
|
|
2023-10-16 15:30:27,085 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7858e4ce5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:27,115 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@41c7fb89 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:27,118 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@42bddbb75 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:27,135 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4db20e2e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:27,308 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:30:27,309 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:30:27,476 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:30:27,488 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.337 seconds (JVM running for 639.954)
|
|
2023-10-16 15:30:27,490 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:30:32,047 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:30:32,047 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:30:32,047 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:30:32,496 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:30:32,496 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2e317c255 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:32,527 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@408690619 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:32,555 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:30:32,578 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:30:32,955 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:30:32,978 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:30:32,984 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:30:32,996 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:30:33,027 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:30:33,028 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:30:33,038 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@8bee746, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@1d56dc46, org.springframework.security.web.context.SecurityContextPersistenceFilter@55fc8c84, org.springframework.security.web.header.HeaderWriterFilter@4c3f64ce, org.springframework.web.filter.CorsFilter@6717d942, org.springframework.security.web.csrf.CsrfFilter@2281cd48, org.springframework.security.web.authentication.logout.LogoutFilter@64555a48, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@3c558ca1, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@1e91f375, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@b43d7c0, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@4464ba53, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@73cabf05, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@ccd9ec2, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@189e4070, org.springframework.security.web.session.SessionManagementFilter@793be566, org.springframework.security.web.access.ExceptionTranslationFilter@2b675ddd, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@34c649ee]
|
|
2023-10-16 15:30:33,046 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@29759711
|
|
2023-10-16 15:30:33,046 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1ea9e0a05 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:33,080 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@26d4b9a49 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:33,083 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@70170dcf5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:33,104 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@755fd1c39 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:33,244 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:30:33,245 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:30:33,380 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:30:33,392 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.374 seconds (JVM running for 645.858)
|
|
2023-10-16 15:30:33,395 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:30:35,957 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:30:35,958 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:30:35,958 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:30:36,416 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3d9875135 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:36,448 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@750097e99 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:36,475 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:30:36,493 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:30:36,789 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:30:36,818 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:30:36,825 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:30:36,842 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:30:36,878 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:30:36,878 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:30:36,878 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:30:36,878 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:30:36,878 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:30:36,878 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:30:36,878 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:30:36,879 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:30:36,890 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@10ba4354, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@51691af8, org.springframework.security.web.context.SecurityContextPersistenceFilter@72d69c16, org.springframework.security.web.header.HeaderWriterFilter@51a6e793, org.springframework.web.filter.CorsFilter@502c4fca, org.springframework.security.web.csrf.CsrfFilter@5dfd174, org.springframework.security.web.authentication.logout.LogoutFilter@489c4a86, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4c7c7ce8, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2ccfec50, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@fd9c962, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2cec5826, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@4a90a857, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@297c1e9, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@3f0ef361, org.springframework.security.web.session.SessionManagementFilter@979b83c, org.springframework.security.web.access.ExceptionTranslationFilter@4e921ed4, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@391548e0]
|
|
2023-10-16 15:30:36,900 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@14e47a1f
|
|
2023-10-16 15:30:36,901 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@662a26dd5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:36,932 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3692e79e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:36,935 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@427798d55 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:36,957 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@757436069 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:37,150 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:30:37,151 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:30:37,349 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:30:37,366 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.447 seconds (JVM running for 649.832)
|
|
2023-10-16 15:30:37,381 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:30:38,885 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:30:38,886 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:30:38,886 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:30:39,261 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3149b2a25 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:39,294 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@56a40db99 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:39,304 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:30:39,319 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:30:39,566 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:30:39,589 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:30:39,594 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:30:39,607 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:30:39,638 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:30:39,639 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:30:39,639 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:30:39,639 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:30:39,648 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@4d5dfc20, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@33fa0424, org.springframework.security.web.context.SecurityContextPersistenceFilter@24cf1a6e, org.springframework.security.web.header.HeaderWriterFilter@1d740143, org.springframework.web.filter.CorsFilter@3ea7452b, org.springframework.security.web.csrf.CsrfFilter@75717a53, org.springframework.security.web.authentication.logout.LogoutFilter@39056b35, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@65b0fac2, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@6381a0ea, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@165d1087, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@10d8cf4e, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@2d9baa0f, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@5d927441, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@2fd965f3, org.springframework.security.web.session.SessionManagementFilter@5a12409d, org.springframework.security.web.access.ExceptionTranslationFilter@1975badb, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@379eda4]
|
|
2023-10-16 15:30:39,656 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@44f627ed
|
|
2023-10-16 15:30:39,656 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@44f7fc4f5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:39,687 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@318f4f9a9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:39,690 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@41345a3c5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:39,712 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3488d4b89 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:39,854 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:30:39,855 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:30:40,000 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:30:40,010 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.158 seconds (JVM running for 652.476)
|
|
2023-10-16 15:30:40,012 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:30:41,564 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:30:41,564 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:30:41,564 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:30:41,929 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3c5a8b625 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:41,961 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4c4ad2a69 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:41,971 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:30:41,985 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:30:42,316 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:30:42,356 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:30:42,365 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:30:42,389 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:30:42,440 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:30:42,440 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:30:42,440 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:30:42,440 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:30:42,440 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:30:42,440 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:30:42,440 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:30:42,441 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:30:42,442 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:30:42,458 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@2b4ddc4d, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@50e99c40, org.springframework.security.web.context.SecurityContextPersistenceFilter@68bbbbe1, org.springframework.security.web.header.HeaderWriterFilter@57b87d8a, org.springframework.web.filter.CorsFilter@132c46d2, org.springframework.security.web.csrf.CsrfFilter@75177a6a, org.springframework.security.web.authentication.logout.LogoutFilter@4923ad9d, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@634d5f76, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@f0a9207, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@38886afe, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@44a4ddf0, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@50e4bcc3, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@ba8a6f0, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@22f2818a, org.springframework.security.web.session.SessionManagementFilter@26b15177, org.springframework.security.web.access.ExceptionTranslationFilter@25f1384e, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@492c8f3b]
|
|
2023-10-16 15:30:42,473 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@389f520c
|
|
2023-10-16 15:30:42,474 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7edca4665 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:42,507 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6b4f3d499 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:42,510 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@43c835095 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:42,533 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@105104e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:42,677 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:30:42,677 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:30:42,803 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:30:42,813 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.284 seconds (JVM running for 655.279)
|
|
2023-10-16 15:30:42,827 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:30:46,398 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:30:46,399 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:30:46,399 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:30:46,822 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7cdcb6ab5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:46,854 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5f658c799 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:46,864 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:30:46,878 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:30:47,193 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:30:47,214 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:30:47,219 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:30:47,231 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:30:47,262 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:30:47,262 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:30:47,262 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:30:47,262 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:30:47,262 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:30:47,263 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:30:47,273 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@4b9b6a80, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@5918a647, org.springframework.security.web.context.SecurityContextPersistenceFilter@1880d4d6, org.springframework.security.web.header.HeaderWriterFilter@db6e52, org.springframework.web.filter.CorsFilter@6c8187dc, org.springframework.security.web.csrf.CsrfFilter@79330fad, org.springframework.security.web.authentication.logout.LogoutFilter@271ca6bd, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4bfe753b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@73f917d0, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@4b2d460, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@646e3bfa, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@3f1c60db, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@62646d23, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@73748e78, org.springframework.security.web.session.SessionManagementFilter@792ff239, org.springframework.security.web.access.ExceptionTranslationFilter@5fe47ed2, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@5f9be2dd]
|
|
2023-10-16 15:30:47,281 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@38c4d85e
|
|
2023-10-16 15:30:47,282 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@a645865 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:47,314 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@51ff07fb9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:47,317 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@504e1bec5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:30:47,339 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4ed62f939 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:30:47,499 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:30:47,499 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:30:47,684 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:30:47,699 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.331 seconds (JVM running for 660.165)
|
|
2023-10-16 15:30:47,703 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:31:15,575 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:31:15,575 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:31:15,575 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:31:16,003 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:31:16,004 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2dd3adb45 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:16,031 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@44acc7919 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:16,040 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:31:16,058 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:31:16,293 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:31:16,317 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:31:16,322 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:31:16,335 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:31:16,366 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:31:16,367 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:31:16,367 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:31:16,367 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:31:16,367 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:31:16,367 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:31:16,367 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:31:16,377 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@7c73af11, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@7439dbd1, org.springframework.security.web.context.SecurityContextPersistenceFilter@567a693f, org.springframework.security.web.header.HeaderWriterFilter@7e4831f1, org.springframework.web.filter.CorsFilter@3cfb5600, org.springframework.security.web.csrf.CsrfFilter@701341a, org.springframework.security.web.authentication.logout.LogoutFilter@dd6b0b2, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@6717df50, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@3d140099, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@60cd01f7, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@4602ee83, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@79fa980b, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@69341d07, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@25c719a6, org.springframework.security.web.session.SessionManagementFilter@58d537db, org.springframework.security.web.access.ExceptionTranslationFilter@12c04506, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@346585d8]
|
|
2023-10-16 15:31:16,384 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@3ad87df8
|
|
2023-10-16 15:31:16,385 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3ca6c6065 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:16,407 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4536240e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:16,410 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1fcfa3b55 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:16,429 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@66812a099 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:16,574 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:31:16,574 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:31:16,723 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:31:16,736 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.207 seconds (JVM running for 689.202)
|
|
2023-10-16 15:31:16,743 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:31:18,272 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:31:18,272 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:31:18,273 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:31:18,618 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2d8f86a55 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:18,647 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@72561d719 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:18,657 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:31:18,671 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:31:19,140 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:31:19,209 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:31:19,221 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:31:19,237 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:31:19,284 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:31:19,285 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:31:19,298 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@79240e31, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@4a1b2cee, org.springframework.security.web.context.SecurityContextPersistenceFilter@77ffaafd, org.springframework.security.web.header.HeaderWriterFilter@6483f777, org.springframework.web.filter.CorsFilter@7233309e, org.springframework.security.web.csrf.CsrfFilter@7bdba72f, org.springframework.security.web.authentication.logout.LogoutFilter@320a3242, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@5e9d1d24, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2b7f864d, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@2482f1da, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@4e34385f, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@35f756a1, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@1d01860e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@4f664ec4, org.springframework.security.web.session.SessionManagementFilter@513b8d2a, org.springframework.security.web.access.ExceptionTranslationFilter@22c36623, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@3c7b10c6]
|
|
2023-10-16 15:31:19,308 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@1ee3d884
|
|
2023-10-16 15:31:19,308 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@16cdf5fa5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:19,333 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@11283b8d9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:19,336 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@56ed9b7b5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:19,355 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@564a4eda9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:19,526 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:31:19,528 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:31:19,789 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:31:19,818 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.574 seconds (JVM running for 692.284)
|
|
2023-10-16 15:31:19,827 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:31:21,337 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:31:21,337 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:31:21,337 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:31:21,699 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7c205f785 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:21,726 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@667f89f49 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:21,737 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:31:21,755 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:31:22,009 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:31:22,029 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:31:22,034 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:31:22,045 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:31:22,071 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:31:22,072 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:31:22,084 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@3950663e, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@753202fb, org.springframework.security.web.context.SecurityContextPersistenceFilter@b412346, org.springframework.security.web.header.HeaderWriterFilter@11c7c29b, org.springframework.web.filter.CorsFilter@10d71756, org.springframework.security.web.csrf.CsrfFilter@43b253d0, org.springframework.security.web.authentication.logout.LogoutFilter@2eef6e91, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@64bf19ee, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@731577d4, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@76c74d32, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@3ff23c69, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@100ef216, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@2d41705e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@253c6b1e, org.springframework.security.web.session.SessionManagementFilter@5abcc712, org.springframework.security.web.access.ExceptionTranslationFilter@7fc969de, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@78d5c545]
|
|
2023-10-16 15:31:22,091 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@6967d988
|
|
2023-10-16 15:31:22,092 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5e7151d75 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:22,121 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@57e69a269 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:22,123 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4d0d05f75 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:22,142 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1a712e479 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:22,280 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:31:22,281 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:31:22,422 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:31:22,433 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.127 seconds (JVM running for 694.899)
|
|
2023-10-16 15:31:22,435 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:31:25,032 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:31:25,033 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:31:25,033 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:31:25,408 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@23ed9a4c5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:25,437 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1bf50a2b9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:25,448 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:31:25,463 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:31:25,715 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:31:25,736 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:31:25,741 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:31:25,751 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:31:25,783 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:31:25,784 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:31:25,784 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:31:25,784 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:31:25,793 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@1bd257f3, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@5b9d3c93, org.springframework.security.web.context.SecurityContextPersistenceFilter@559976b1, org.springframework.security.web.header.HeaderWriterFilter@ed56346, org.springframework.web.filter.CorsFilter@44713058, org.springframework.security.web.csrf.CsrfFilter@3546212c, org.springframework.security.web.authentication.logout.LogoutFilter@1b937ea, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@5cf41132, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@47bbea33, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@40f00ffd, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@78e66958, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5d8cfa51, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@436fbfa1, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@67d3a7ba, org.springframework.security.web.session.SessionManagementFilter@51d272e6, org.springframework.security.web.access.ExceptionTranslationFilter@782aaf1d, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@1ce785e3]
|
|
2023-10-16 15:31:25,800 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@38040418
|
|
2023-10-16 15:31:25,800 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@20be784c5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:25,828 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@28e5413e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:25,831 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@65de46b95 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:25,851 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7d62bade9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:26,001 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:31:26,002 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:31:26,144 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:31:26,154 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.16 seconds (JVM running for 698.62)
|
|
2023-10-16 15:31:26,156 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:31:49,520 DEBUG [XNIO-49 task-1] FilterChainProxy: Securing GET /
|
|
2023-10-16 15:31:49,521 DEBUG [XNIO-49 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,521 DEBUG [XNIO-49 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,521 DEBUG [XNIO-49 task-1] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,521 DEBUG [XNIO-49 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /]
|
|
2023-10-16 15:31:49,522 DEBUG [XNIO-49 task-1] FilterChainProxy: Secured GET /
|
|
2023-10-16 15:31:49,530 DEBUG [XNIO-49 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,530 DEBUG [XNIO-49 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,530 DEBUG [XNIO-49 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,559 DEBUG [XNIO-49 task-1] FilterChainProxy: Securing GET /content/css/loading.css
|
|
2023-10-16 15:31:49,559 DEBUG [XNIO-49 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-2] FilterChainProxy: Securing GET /styles.css
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-1] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-2] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /content/css/loading.css] with attributes [permitAll]
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /styles.css]
|
|
2023-10-16 15:31:49,560 DEBUG [XNIO-49 task-1] FilterChainProxy: Secured GET /content/css/loading.css
|
|
2023-10-16 15:31:49,561 DEBUG [XNIO-49 task-2] FilterChainProxy: Secured GET /styles.css
|
|
2023-10-16 15:31:49,561 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /polyfills.js
|
|
2023-10-16 15:31:49,561 DEBUG [XNIO-49 task-4] FilterChainProxy: Securing GET /runtime.js
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-5] FilterChainProxy: Securing GET /main.js
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-4] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-4] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-5] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-3] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /runtime.js]
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-5] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-4] FilterChainProxy: Secured GET /runtime.js
|
|
2023-10-16 15:31:49,562 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /polyfills.js]
|
|
2023-10-16 15:31:49,563 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /polyfills.js
|
|
2023-10-16 15:31:49,563 DEBUG [XNIO-49 task-5] FilterSecurityInterceptor: Authorized public object filter invocation [GET /main.js]
|
|
2023-10-16 15:31:49,563 DEBUG [XNIO-49 task-5] FilterChainProxy: Secured GET /main.js
|
|
2023-10-16 15:31:49,564 DEBUG [XNIO-49 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,564 DEBUG [XNIO-49 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,564 DEBUG [XNIO-49 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,564 DEBUG [XNIO-49 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,566 DEBUG [XNIO-49 task-5] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,566 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,566 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,567 DEBUG [XNIO-49 task-5] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,567 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,567 DEBUG [XNIO-49 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,567 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,567 DEBUG [XNIO-49 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,567 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,571 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,571 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,591 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:31:49,591 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,591 DEBUG [XNIO-49 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,591 DEBUG [XNIO-49 task-3] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,592 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /content/images/logo-jhipster.png] with attributes [permitAll]
|
|
2023-10-16 15:31:49,592 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:31:49,594 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,594 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,594 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,639 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:31:49,639 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,639 DEBUG [XNIO-49 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,639 DEBUG [XNIO-49 task-3] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,639 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_bootstrap_ts.js]
|
|
2023-10-16 15:31:49,639 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:31:49,641 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,665 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,665 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,911 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:31:49,911 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,911 DEBUG [XNIO-49 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,911 DEBUG [XNIO-49 task-3] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,911 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7] with attributes [permitAll]
|
|
2023-10-16 15:31:49,911 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:31:49,914 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,914 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,914 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,917 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-3] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-2] FilterChainProxy: Securing GET /management/info
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-2] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,918 DEBUG [XNIO-49 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /management/info] with attributes [permitAll]
|
|
2023-10-16 15:31:49,919 DEBUG [XNIO-49 task-2] FilterChainProxy: Secured GET /management/info
|
|
2023-10-16 15:31:49,919 DEBUG [XNIO-49 task-3] AccountResource: Enter: getAccount() with argument[s] = [null]
|
|
2023-10-16 15:31:49,921 DEBUG [XNIO-49 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,922 DEBUG [XNIO-49 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,922 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,923 ERROR [XNIO-49 task-3] AccountResource: Exception in getAccount() with cause = 'NULL' and exception = 'User could not be found'
|
|
org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$AccountResourceException: User could not be found
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource.getAccount(AccountResource.java:56)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$FastClassBySpringCGLIB$$b077edab.invoke(<generated>)
|
|
at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:793)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.AspectJAfterThrowingAdvice.invoke(AspectJAfterThrowingAdvice.java:64)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.MethodInvocationProceedingJoinPoint.proceed(MethodInvocationProceedingJoinPoint.java:89)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.aop.logging.LoggingAspect.logAround(LoggingAspect.java:105)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethodWithGivenArgs(AbstractAspectJAdvice.java:634)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethod(AbstractAspectJAdvice.java:624)
|
|
at org.springframework.aop.aspectj.AspectJAroundAdvice.invoke(AspectJAroundAdvice.java:72)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.interceptor.ExposeInvocationInterceptor.invoke(ExposeInvocationInterceptor.java:97)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:708)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$EnhancerBySpringCGLIB$$58dac763.getAccount(<generated>)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
|
|
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
|
|
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
|
|
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1070)
|
|
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
|
|
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
|
|
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:497)
|
|
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:584)
|
|
at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:74)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:129)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:111)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.filter.OAuth2RefreshTokensWebFilter.doFilterInternal(OAuth2RefreshTokensWebFilter.java:70)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:337)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:115)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:122)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:116)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:126)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter.doFilterInternal(OAuth2AuthorizationCodeGrantFilter.java:168)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:109)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:149)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:63)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:223)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:117)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.web.filter.CorsFilter.doFilterInternal(CorsFilter.java:91)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221)
|
|
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:354)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:267)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)
|
|
at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)
|
|
at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)
|
|
at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)
|
|
at io.undertow.servlet.handlers.RedirectDirHandler.handleRequest(RedirectDirHandler.java:68)
|
|
at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:117)
|
|
at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)
|
|
at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
|
|
at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java:60)
|
|
at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java:77)
|
|
at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SendErrorPageHandler.handleRequest(SendErrorPageHandler.java:52)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SessionRestoringHandler.handleRequest(SessionRestoringHandler.java:119)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:275)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:134)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:131)
|
|
at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)
|
|
at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:255)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:100)
|
|
at io.undertow.server.Connectors.executeRootHandler(Connectors.java:387)
|
|
at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:852)
|
|
at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
|
|
at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:2019)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1558)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1449)
|
|
at org.xnio.XnioWorker$WorkerThreadFactory$1$1.run(XnioWorker.java:1282)
|
|
at java.base/java.lang.Thread.run(Thread.java:829)
|
|
2023-10-16 15:31:49,926 ERROR [XNIO-49 task-3] AdviceTraits: Internal Server Error
|
|
org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$AccountResourceException: User could not be found
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource.getAccount(AccountResource.java:56)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$FastClassBySpringCGLIB$$b077edab.invoke(<generated>)
|
|
at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:793)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.AspectJAfterThrowingAdvice.invoke(AspectJAfterThrowingAdvice.java:64)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.aspectj.MethodInvocationProceedingJoinPoint.proceed(MethodInvocationProceedingJoinPoint.java:89)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.aop.logging.LoggingAspect.logAround(LoggingAspect.java:105)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethodWithGivenArgs(AbstractAspectJAdvice.java:634)
|
|
at org.springframework.aop.aspectj.AbstractAspectJAdvice.invokeAdviceMethod(AbstractAspectJAdvice.java:624)
|
|
at org.springframework.aop.aspectj.AspectJAroundAdvice.invoke(AspectJAroundAdvice.java:72)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.interceptor.ExposeInvocationInterceptor.invoke(ExposeInvocationInterceptor.java:97)
|
|
at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186)
|
|
at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:763)
|
|
at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:708)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$$EnhancerBySpringCGLIB$$58dac763.getAccount(<generated>)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
|
|
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
|
|
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
|
|
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205)
|
|
at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150)
|
|
at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895)
|
|
at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808)
|
|
at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87)
|
|
at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1070)
|
|
at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
|
|
at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
|
|
at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:497)
|
|
at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
|
|
at javax.servlet.http.HttpServlet.service(HttpServlet.java:584)
|
|
at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:74)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:129)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:111)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.gcube.fullstackapps.informationsystemmonitor.web.filter.OAuth2RefreshTokensWebFilter.doFilterInternal(OAuth2RefreshTokensWebFilter.java:70)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:337)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.invoke(FilterSecurityInterceptor.java:115)
|
|
at org.springframework.security.web.access.intercept.FilterSecurityInterceptor.doFilter(FilterSecurityInterceptor.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:122)
|
|
at org.springframework.security.web.access.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:116)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:126)
|
|
at org.springframework.security.web.session.SessionManagementFilter.doFilter(SessionManagementFilter.java:81)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter.doFilterInternal(OAuth2AuthorizationCodeGrantFilter.java:168)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AnonymousAuthenticationFilter.doFilter(AnonymousAuthenticationFilter.java:109)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter.doFilter(SecurityContextHolderAwareRequestFilter.java:149)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.savedrequest.RequestCacheAwareFilter.doFilter(RequestCacheAwareFilter.java:63)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:223)
|
|
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:217)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter.doFilterInternal(OAuth2AuthorizationRequestRedirectFilter.java:178)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:103)
|
|
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:89)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.csrf.CsrfFilter.doFilterInternal(CsrfFilter.java:117)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.web.filter.CorsFilter.doFilterInternal(CorsFilter.java:91)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
|
|
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:112)
|
|
at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:82)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:55)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:346)
|
|
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:221)
|
|
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:186)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:354)
|
|
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:267)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
|
|
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
|
|
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:61)
|
|
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
|
|
at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)
|
|
at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)
|
|
at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)
|
|
at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)
|
|
at io.undertow.servlet.handlers.RedirectDirHandler.handleRequest(RedirectDirHandler.java:68)
|
|
at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:117)
|
|
at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)
|
|
at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
|
|
at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java:60)
|
|
at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java:77)
|
|
at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SendErrorPageHandler.handleRequest(SendErrorPageHandler.java:52)
|
|
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
|
|
at io.undertow.servlet.handlers.SessionRestoringHandler.handleRequest(SessionRestoringHandler.java:119)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:275)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:134)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:131)
|
|
at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)
|
|
at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:255)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:79)
|
|
at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:100)
|
|
at io.undertow.server.Connectors.executeRootHandler(Connectors.java:387)
|
|
at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:852)
|
|
at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
|
|
at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:2019)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1558)
|
|
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1449)
|
|
at org.xnio.XnioWorker$WorkerThreadFactory$1$1.run(XnioWorker.java:1282)
|
|
at java.base/java.lang.Thread.run(Thread.java:829)
|
|
2023-10-16 15:31:49,934 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,934 WARN [XNIO-49 task-3] ExceptionHandlerExceptionResolver: Resolved [org.gcube.fullstackapps.informationsystemmonitor.web.rest.AccountResource$AccountResourceException: User could not be found]
|
|
2023-10-16 15:31:49,934 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,934 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:49,966 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /logo-jhipster.png
|
|
2023-10-16 15:31:49,966 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:49,966 DEBUG [XNIO-49 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 15:31:49,967 DEBUG [XNIO-49 task-3] SessionManagementFilter: Request requested invalid session id QPG-zwMbIlso3OxOUwk8Iys0JMSS6YcZ53vVKN_l
|
|
2023-10-16 15:31:49,967 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /logo-jhipster.png]
|
|
2023-10-16 15:31:49,967 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /logo-jhipster.png
|
|
2023-10-16 15:31:49,969 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,969 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 15:31:49,969 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,044 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /oauth2/authorization/oidc
|
|
2023-10-16 15:31:56,044 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:56,045 DEBUG [XNIO-49 task-3] DefaultRedirectStrategy: Redirecting to https://accounts.dev.d4science.org/auth/realms/d4science/protocol/openid-connect/auth?response_type=code&client_id=pc-paratore.isti.cnr.it&scope=openid%20profile%20email%20phone%20offline_access&state=tVu0ryUIIuQcoEZnu6tgtucoDIrAFxlpamXEBj-0_3U%3D&redirect_uri=http://localhost:8080/login/oauth2/code/oidc&nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4
|
|
2023-10-16 15:31:56,045 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:31:56,045 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 15:31:56,046 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,182 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /login/oauth2/code/oidc?state=tVu0ryUIIuQcoEZnu6tgtucoDIrAFxlpamXEBj-0_3U%3D&session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3&code=2e6185c7-3997-47a9-a077-d16f06bc2446.2b9d6128-7d9f-4c41-8984-fe01cd3723e3.4f47f28a-2d6d-41e0-b695-f7b6c2ca83f9
|
|
2023-10-16 15:31:56,183 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 15:31:56,233 DEBUG [XNIO-49 task-3] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:31:56,234 DEBUG [XNIO-49 task-3] HttpURLConnection: sun.net.www.MessageHeader@3ba93a278 pairs: {POST /auth/realms/d4science/protocol/openid-connect/token HTTP/1.1: null}{Accept: application/json;charset=UTF-8}{Content-Type: application/x-www-form-urlencoded;charset=UTF-8}{Authorization: Basic cGMtcGFyYXRvcmUuaXN0aS5jbnIuaXQ6TGx5RlB0amxIZHY5NVBRM3diN3JZcDBQVlZESzJmTmo=}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}{Content-Length: 219}
|
|
2023-10-16 15:31:56,490 DEBUG [XNIO-49 task-3] HttpURLConnection: sun.net.www.MessageHeader@364b41b410 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-store}{x-content-type-options: nosniff}{pragma: no-cache}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 5077}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:56,493 DEBUG [XNIO-49 task-3] HttpURLConnection: sun.net.www.MessageHeader@6e5b8c095 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:56,515 DEBUG [XNIO-49 task-3] HttpURLConnection: sun.net.www.MessageHeader@4f6a44219 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:56,517 DEBUG [XNIO-49 task-3] HttpURLConnection: sun.net.www.MessageHeader@3d6037e96 pairs: {GET /auth/realms/d4science/protocol/openid-connect/userinfo HTTP/1.1: null}{Accept: application/json}{Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.F4-qg3hhctfpsu5aO_5VJJXVXveEQxCQJIn9xEqbs0AOVE3Iu3-pqrCvNnBofu2pjKFOibr3JlPJVljlXrXlQBQJFGVSv0b0F3szp3lruz-Io5mI7fItOKmsqV8sv-J_hx8JI91MIyCPPiudBcTqVAs9pGxZo7NtQpI5ZMFJ4I2SW4wMHtnxlf0yHONfJ0kztrXVQeN6nVluchklTGozGBxIJd6AeVRHYh-kjoTEMKVlpJUULXjDdr6ZIMb6va-VEffrp2jZNLG7VAU-WkvqPNBUJRJSDyUEmjJY_OLyl4QULX_H7ev5vFxV9blVASBSX20NUSl1wCtb06cdlvfM9Q}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:31:56,543 DEBUG [XNIO-49 task-3] HttpURLConnection: sun.net.www.MessageHeader@514a97109 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 663}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:31:56,544 DEBUG [XNIO-49 task-3] SecurityConfiguration: Authorities: [ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]
|
|
2023-10-16 15:31:56,545 DEBUG [XNIO-49 task-3] SecurityConfiguration: Authority: ROLE_USER
|
|
2023-10-16 15:31:56,545 DEBUG [XNIO-49 task-3] SecurityConfiguration: TokenValue: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.awBrH0-DFqCkH2FbL6KgsqL9pTlMgNZNCISUYYpYyqo-RbWuAxRO9X81LSDKQTzcLaxEksroHHPJ9DC1aAanVR7PZvXAWHapMCeiAJ3gbrF6BHm3ThqzWTk17UDMGaSEjSLatkjFix-1r-_ikXbK84q_4iAy1YVsyUfx_opiDSVasg8S7NygJc_33k7w64ute9ykVLvNXJ-QcX7Ti_8J8a8RUJhcYXawVCL14BVhrfKf6F1CRrby3HcmDoCbT1sIEV-BozQ-iP5gDaj26gJbFNb42j0DSreiuQ25GBExzm9J3WtLau7j6OcYq_cypk01FX6xOPdwNF2A5k7PcPQyrg
|
|
2023-10-16 15:31:56,545 DEBUG [XNIO-49 task-3] SecurityConfiguration: oidcUserAuthority: ROLE_USER
|
|
2023-10-16 15:31:56,546 DEBUG [XNIO-49 task-3] SecurityUtils: extractAuthorityFromClaims: {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 15:31:56,546 DEBUG [XNIO-49 task-3] SecurityUtils: getRolesFromClaims(): {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 15:31:56,546 DEBUG [XNIO-49 task-3] SecurityUtils: ResourceAccess: class java.util.LinkedHashMap
|
|
2023-10-16 15:31:56,546 INFO [XNIO-49 task-3] SecurityUtils: Default Scope: %2Fgcube
|
|
2023-10-16 15:31:56,546 INFO [XNIO-49 task-3] SecurityUtils: D4Science Roles: [Member]
|
|
2023-10-16 15:31:56,547 DEBUG [XNIO-49 task-3] SecurityUtils: mapRolesToGrantedAuthorities(): [Member]
|
|
2023-10-16 15:31:56,547 INFO [XNIO-49 task-3] SecurityUtils: GrantedAuthority: [ROLE_ADMIN]
|
|
2023-10-16 15:31:56,547 DEBUG [XNIO-49 task-3] SecurityConfiguration: Authority: SCOPE_email
|
|
2023-10-16 15:31:56,547 DEBUG [XNIO-49 task-3] SecurityConfiguration: Authority: SCOPE_offline_access
|
|
2023-10-16 15:31:56,547 DEBUG [XNIO-49 task-3] SecurityConfiguration: Authority: SCOPE_openid
|
|
2023-10-16 15:31:56,547 DEBUG [XNIO-49 task-3] SecurityConfiguration: Authority: SCOPE_phone
|
|
2023-10-16 15:31:56,547 DEBUG [XNIO-49 task-3] SecurityConfiguration: Authority: SCOPE_profile
|
|
2023-10-16 15:31:56,547 DEBUG [XNIO-49 task-3] ChangeSessionIdAuthenticationStrategy: Changed session id from fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9
|
|
2023-10-16 15:31:56,548 DEBUG [XNIO-49 task-3] CsrfAuthenticationStrategy: Replaced CSRF Token
|
|
2023-10-16 15:31:56,548 DEBUG [XNIO-49 task-3] OAuth2LoginAuthenticationFilter: Set SecurityContextHolder to OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]
|
|
2023-10-16 15:31:56,548 DEBUG [XNIO-49 task-3] DefaultRedirectStrategy: Redirecting to /
|
|
2023-10-16 15:31:56,549 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@bbfe4667]
|
|
2023-10-16 15:31:56,549 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@bbfe4667]
|
|
2023-10-16 15:31:56,550 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,551 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /
|
|
2023-10-16 15:31:56,552 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,552 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,552 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /]
|
|
2023-10-16 15:31:56,552 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /
|
|
2023-10-16 15:31:56,555 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,574 DEBUG [XNIO-49 task-3] FilterChainProxy: Securing GET /content/css/loading.css
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-2] FilterChainProxy: Securing GET /styles.css
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-5] FilterChainProxy: Securing GET /runtime.js
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-4] FilterChainProxy: Securing GET /polyfills.js
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-5] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,576 DEBUG [XNIO-49 task-1] FilterChainProxy: Securing GET /main.js
|
|
2023-10-16 15:31:56,575 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,576 DEBUG [XNIO-49 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,576 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,576 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,576 DEBUG [XNIO-49 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,576 DEBUG [XNIO-49 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /styles.css]
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-5] FilterSecurityInterceptor: Authorized public object filter invocation [GET /runtime.js]
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /polyfills.js]
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /content/css/loading.css] with attributes [permitAll]
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-2] FilterChainProxy: Secured GET /styles.css
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-5] FilterChainProxy: Secured GET /runtime.js
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-4] FilterChainProxy: Secured GET /polyfills.js
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-3] FilterChainProxy: Secured GET /content/css/loading.css
|
|
2023-10-16 15:31:56,577 DEBUG [XNIO-49 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,578 DEBUG [XNIO-49 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /main.js]
|
|
2023-10-16 15:31:56,578 DEBUG [XNIO-49 task-1] FilterChainProxy: Secured GET /main.js
|
|
2023-10-16 15:31:56,579 DEBUG [XNIO-49 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,579 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,580 DEBUG [XNIO-49 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,580 DEBUG [XNIO-49 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,581 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,601 DEBUG [XNIO-49 task-4] FilterChainProxy: Securing GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:31:56,602 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,602 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,602 DEBUG [XNIO-49 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /content/images/logo-jhipster.png] with attributes [permitAll]
|
|
2023-10-16 15:31:56,602 DEBUG [XNIO-49 task-4] FilterChainProxy: Secured GET /content/images/logo-jhipster.png
|
|
2023-10-16 15:31:56,604 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,645 DEBUG [XNIO-49 task-4] FilterChainProxy: Securing GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:31:56,645 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,645 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,646 DEBUG [XNIO-49 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_bootstrap_ts.js]
|
|
2023-10-16 15:31:56,646 DEBUG [XNIO-49 task-4] FilterChainProxy: Secured GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 15:31:56,667 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,901 DEBUG [XNIO-49 task-4] FilterChainProxy: Securing GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:31:56,902 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,902 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,902 DEBUG [XNIO-49 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7] with attributes [permitAll]
|
|
2023-10-16 15:31:56,902 DEBUG [XNIO-49 task-4] FilterChainProxy: Secured GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 15:31:56,904 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,908 DEBUG [XNIO-49 task-4] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 15:31:56,908 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,909 DEBUG [XNIO-49 task-2] FilterChainProxy: Securing GET /management/info
|
|
2023-10-16 15:31:56,909 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,909 DEBUG [XNIO-49 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,909 DEBUG [XNIO-49 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 15:31:56,909 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,909 DEBUG [XNIO-49 task-4] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 15:31:56,910 DEBUG [XNIO-49 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /management/info] with attributes [permitAll]
|
|
2023-10-16 15:31:56,910 DEBUG [XNIO-49 task-2] FilterChainProxy: Secured GET /management/info
|
|
2023-10-16 15:31:56,910 DEBUG [XNIO-49 task-4] AccountResource: Enter: getAccount() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,910 DEBUG [XNIO-49 task-4] UserService: Enter: getUserFromAuthentication() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,911 DEBUG [XNIO-49 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,912 DEBUG [XNIO-49 task-4] UserService: AuthToken is a OAuth2AuthenticationToken
|
|
2023-10-16 15:31:56,912 DEBUG [XNIO-49 task-4] UserService: Attributes: {at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:31:56,913 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:31:56,914 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:31:56,914 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:31:56,914 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Key:
|
|
2023-10-16 15:31:56,914 DEBUG [XNIO-49 task-4] UserService: *****ResourceAccess Roles:
|
|
2023-10-16 15:31:56,914 DEBUG [XNIO-49 task-4] UserService: Exit: getUserFromAuthentication() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 15:31:56,916 DEBUG [XNIO-49 task-4] AccountResource: Exit: getAccount() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 15:31:56,922 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:31:56,957 DEBUG [XNIO-49 task-4] FilterChainProxy: Securing GET /logo-jhipster.png
|
|
2023-10-16 15:31:56,957 DEBUG [XNIO-49 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,958 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=T-TIjg7ZFz8J-s1fHio6HA, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=aLwCSehee0KMUvUqXGaHKf9pwST_aSn949zOZcckDO4, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T13:28:48Z, name=Maria Teresa Paratore, exp=2023-10-16T14:01:56Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T13:31:56Z, email=mariateresa.paratore@isti.cnr.it, jti=2ffaddf5-81a3-4fd9-8da1-6f73fa2a80c3}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=fucZ8p797TszK42thOd0O53uF16vYCdV4sax7Lg9], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 15:31:56,958 DEBUG [XNIO-49 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /logo-jhipster.png]
|
|
2023-10-16 15:31:56,958 DEBUG [XNIO-49 task-4] FilterChainProxy: Secured GET /logo-jhipster.png
|
|
2023-10-16 15:31:56,959 DEBUG [XNIO-49 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 15:32:01,184 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:32:01,185 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:32:01,185 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:32:01,751 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:32:01,752 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4f6e1785 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:01,776 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3445700f9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:01,788 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:32:01,803 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:32:02,111 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:32:02,132 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:32:02,137 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:32:02,158 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:32:02,202 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:32:02,202 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:32:02,202 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:32:02,203 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:32:02,203 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:32:02,203 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:32:02,203 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:32:02,203 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:32:02,203 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:32:02,203 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:32:02,204 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:32:02,204 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:32:02,204 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:32:02,204 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:32:02,204 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:32:02,204 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:32:02,204 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:32:02,226 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@30073339, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@1a620c0b, org.springframework.security.web.context.SecurityContextPersistenceFilter@224ddc7b, org.springframework.security.web.header.HeaderWriterFilter@47aa83b3, org.springframework.web.filter.CorsFilter@76bda1fe, org.springframework.security.web.csrf.CsrfFilter@18a18df5, org.springframework.security.web.authentication.logout.LogoutFilter@18124138, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@25ddc3c1, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@46ee6905, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@6479d6c4, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@4847ba95, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5b631f35, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@2f71f803, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@7b8f3442, org.springframework.security.web.session.SessionManagementFilter@36973179, org.springframework.security.web.access.ExceptionTranslationFilter@43352aa5, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@19d48103]
|
|
2023-10-16 15:32:02,254 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@35015301
|
|
2023-10-16 15:32:02,256 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@53e755185 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:02,284 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@22846e569 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:02,290 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1d30278f5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:02,307 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2296e6739 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:02,502 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:32:02,502 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:32:02,627 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:32:02,638 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.512 seconds (JVM running for 735.104)
|
|
2023-10-16 15:32:02,640 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:32:44,018 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:32:44,019 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:32:44,019 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:32:44,498 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:32:44,499 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@15dc5835 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:44,538 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@17284769 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:44,548 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:32:44,562 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:32:44,861 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:32:44,890 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:32:44,896 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:32:44,908 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:32:44,943 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:32:44,944 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:32:44,954 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@177fb8f5, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@4273498e, org.springframework.security.web.context.SecurityContextPersistenceFilter@6f5c8334, org.springframework.security.web.header.HeaderWriterFilter@22902f20, org.springframework.web.filter.CorsFilter@26d5c64c, org.springframework.security.web.csrf.CsrfFilter@6fb43e5a, org.springframework.security.web.authentication.logout.LogoutFilter@4433e6d6, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2e57ee7e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4830ac1b, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@378c4aae, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@6c1e0d8d, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@4f54c601, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@f6e65af, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@64a925c, org.springframework.security.web.session.SessionManagementFilter@21542faa, org.springframework.security.web.access.ExceptionTranslationFilter@29554290, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@3a2e8352]
|
|
2023-10-16 15:32:44,961 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@4ea8a8b1
|
|
2023-10-16 15:32:44,961 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4e00fe495 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:45,001 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7d1975a09 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:45,004 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@22eef1ca5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:45,027 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@298838069 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:45,250 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:32:45,251 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:32:45,387 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:32:45,400 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.475 seconds (JVM running for 777.866)
|
|
2023-10-16 15:32:45,403 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:32:48,982 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:32:48,982 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:32:48,982 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:32:49,429 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3494ae795 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:49,459 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1725664d9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:49,495 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:32:49,521 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:32:49,820 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:32:49,849 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:32:49,855 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:32:49,868 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:32:49,905 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:32:49,906 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:32:49,906 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:32:49,906 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:32:49,906 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:32:49,921 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@47f1ee81, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@34f74029, org.springframework.security.web.context.SecurityContextPersistenceFilter@5bbabf0c, org.springframework.security.web.header.HeaderWriterFilter@5e35be3d, org.springframework.web.filter.CorsFilter@237b5c3b, org.springframework.security.web.csrf.CsrfFilter@27105757, org.springframework.security.web.authentication.logout.LogoutFilter@44c2b75e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@127a4ac8, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@648baac0, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@3ca9fb85, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@68f6c456, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@1bc14b23, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@d1331dd, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@79dc8b0, org.springframework.security.web.session.SessionManagementFilter@7eb5e562, org.springframework.security.web.access.ExceptionTranslationFilter@27029fa2, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@352acbfa]
|
|
2023-10-16 15:32:49,931 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@360a5930
|
|
2023-10-16 15:32:49,931 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@67eb19a75 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:49,955 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3875d0009 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:49,957 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3fa37bdb5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:32:49,977 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5b0476c69 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:32:50,128 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:32:50,129 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:32:50,266 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:32:50,280 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.331 seconds (JVM running for 782.746)
|
|
2023-10-16 15:32:50,283 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:33:06,016 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:33:06,016 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:33:06,017 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:33:06,454 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:33:06,454 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@364da9ea5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:06,477 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7f8a12289 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:06,486 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:33:06,504 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:33:06,820 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:33:06,843 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:33:06,848 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:33:06,862 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:33:06,897 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:33:06,898 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:33:06,910 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@397a1593, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@3ce3823b, org.springframework.security.web.context.SecurityContextPersistenceFilter@30382e2c, org.springframework.security.web.header.HeaderWriterFilter@78a5c019, org.springframework.web.filter.CorsFilter@e23c09e, org.springframework.security.web.csrf.CsrfFilter@50986985, org.springframework.security.web.authentication.logout.LogoutFilter@59949655, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@7580678, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@76023079, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@63bcd40b, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@208237fd, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@76f18efc, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@5b05ec26, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@7ed6a7f7, org.springframework.security.web.session.SessionManagementFilter@237fbf87, org.springframework.security.web.access.ExceptionTranslationFilter@19413d73, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@cb09d8b]
|
|
2023-10-16 15:33:06,919 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@36c7de95
|
|
2023-10-16 15:33:06,920 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1173fac35 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:06,947 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3e04064e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:06,949 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@74612775 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:06,966 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@ffd477c9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:07,125 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:33:07,126 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:33:07,287 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:33:07,298 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.335 seconds (JVM running for 799.765)
|
|
2023-10-16 15:33:07,301 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:33:10,931 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:33:10,931 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:33:10,931 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:33:11,297 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2672539b5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:11,325 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3bf68a619 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:11,336 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:33:11,352 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:33:11,625 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:33:11,662 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:33:11,670 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:33:11,694 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:33:11,747 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:33:11,748 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:33:11,761 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@207a2b9b, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@161032eb, org.springframework.security.web.context.SecurityContextPersistenceFilter@7f764a84, org.springframework.security.web.header.HeaderWriterFilter@1fb70202, org.springframework.web.filter.CorsFilter@c98f292, org.springframework.security.web.csrf.CsrfFilter@60d270bf, org.springframework.security.web.authentication.logout.LogoutFilter@6ad4d9a0, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4bb4d2d8, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@27bc171d, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@3f5131be, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@18d00bbc, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@3fd0adb6, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@51d3dbcb, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@4d3512f7, org.springframework.security.web.session.SessionManagementFilter@cd28429, org.springframework.security.web.access.ExceptionTranslationFilter@197fc7d9, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@4a341aff]
|
|
2023-10-16 15:33:11,770 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@6d99288c
|
|
2023-10-16 15:33:11,771 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@79b3c7215 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:11,797 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3129ffed9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:11,802 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@146541005 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:11,822 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@301cc6489 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:12,004 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:33:12,006 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:33:12,222 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:33:12,234 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.338 seconds (JVM running for 804.701)
|
|
2023-10-16 15:33:12,255 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:33:13,925 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:33:13,925 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:33:13,926 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:33:14,447 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@af293b75 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:14,473 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@363aa1d79 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:14,486 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:33:14,506 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:33:14,802 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:33:14,827 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:33:14,833 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:33:14,852 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:33:14,888 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:33:14,900 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@3bab87bb, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@d856e4f, org.springframework.security.web.context.SecurityContextPersistenceFilter@9933e5d, org.springframework.security.web.header.HeaderWriterFilter@248d8773, org.springframework.web.filter.CorsFilter@73e832d0, org.springframework.security.web.csrf.CsrfFilter@513d23c5, org.springframework.security.web.authentication.logout.LogoutFilter@4e28cb26, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@6c7c8672, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@816b732, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@48efcef7, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@675b4a37, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@2f25ffb0, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@3097f7ea, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@33ecd8a2, org.springframework.security.web.session.SessionManagementFilter@310800b2, org.springframework.security.web.access.ExceptionTranslationFilter@1e7e0b0b, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@79f8473d]
|
|
2023-10-16 15:33:14,913 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@62c5e428
|
|
2023-10-16 15:33:14,914 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@503a46745 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:14,937 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1423c4009 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:14,940 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@236cc59d5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:14,957 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6ec5917c9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:15,145 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:33:15,146 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:33:15,315 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:33:15,327 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.466 seconds (JVM running for 807.794)
|
|
2023-10-16 15:33:15,330 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:33:17,997 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:33:17,997 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:33:17,997 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:33:18,382 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@26edb4f35 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:18,408 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@794576889 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:18,419 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:33:18,434 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:33:18,686 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:33:18,707 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:33:18,712 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:33:18,724 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:33:18,765 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:33:18,765 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:33:18,765 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:33:18,765 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:33:18,766 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:33:18,779 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@4ec62a40, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@6bbf2e72, org.springframework.security.web.context.SecurityContextPersistenceFilter@1702cb7, org.springframework.security.web.header.HeaderWriterFilter@16d5933f, org.springframework.web.filter.CorsFilter@3a7a4d54, org.springframework.security.web.csrf.CsrfFilter@74cfd40a, org.springframework.security.web.authentication.logout.LogoutFilter@69565f5a, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@5f054839, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@16573e4e, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@291189bb, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@76375a0e, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@4cc1739c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@4435c805, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@3b77f997, org.springframework.security.web.session.SessionManagementFilter@b15d65b, org.springframework.security.web.access.ExceptionTranslationFilter@6142de41, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@710b80cb]
|
|
2023-10-16 15:33:18,791 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@11015002
|
|
2023-10-16 15:33:18,791 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@313f00de5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:18,818 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5dfc7f169 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:18,820 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@788f49b15 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:18,842 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@639587e29 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:19,030 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:33:19,031 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:33:19,223 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:33:19,235 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.272 seconds (JVM running for 811.702)
|
|
2023-10-16 15:33:19,238 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:33:25,891 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:33:25,891 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:33:25,891 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:33:26,301 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:33:26,302 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6c0fd7a75 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:26,327 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@220fba599 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:26,336 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:33:26,350 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:33:26,611 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:33:26,649 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:33:26,657 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:33:26,675 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:33:26,730 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:33:26,731 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:33:26,749 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@5d8e4187, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@73220918, org.springframework.security.web.context.SecurityContextPersistenceFilter@2194318e, org.springframework.security.web.header.HeaderWriterFilter@3070da59, org.springframework.web.filter.CorsFilter@16dc3f39, org.springframework.security.web.csrf.CsrfFilter@4d7c38d0, org.springframework.security.web.authentication.logout.LogoutFilter@7a0eb036, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@5cce597b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@c4e49bc, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@47cd29ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@508ed2f6, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@661a78ac, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@ddfbd69, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@7325cb19, org.springframework.security.web.session.SessionManagementFilter@d823256, org.springframework.security.web.access.ExceptionTranslationFilter@180d2cd6, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@156d5f2b]
|
|
2023-10-16 15:33:26,760 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@519aacf6
|
|
2023-10-16 15:33:26,761 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5dcc58f75 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:26,787 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@596a9a909 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:26,789 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@37690c5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:26,806 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@44e88e09 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:26,991 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:33:26,992 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:33:27,158 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:33:27,170 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.324 seconds (JVM running for 819.637)
|
|
2023-10-16 15:33:27,173 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:33:29,741 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:33:29,741 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:33:29,741 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:33:30,065 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2cfd7e965 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:30,091 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3cf624789 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:30,100 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:33:30,114 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:33:30,376 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:33:30,397 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:33:30,402 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:33:30,413 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:33:30,446 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:33:30,447 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:33:30,447 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:33:30,447 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:33:30,447 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:33:30,447 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:33:30,447 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:33:30,447 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:33:30,458 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@635fe15a, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@46d0fb4e, org.springframework.security.web.context.SecurityContextPersistenceFilter@941d4b, org.springframework.security.web.header.HeaderWriterFilter@13828040, org.springframework.web.filter.CorsFilter@4761f32e, org.springframework.security.web.csrf.CsrfFilter@1e5508ab, org.springframework.security.web.authentication.logout.LogoutFilter@6c37f76f, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4a212b4d, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@335222d6, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@6088b453, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@6f23d751, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@6824da75, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@64b625d0, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@20e7dd48, org.springframework.security.web.session.SessionManagementFilter@36325b76, org.springframework.security.web.access.ExceptionTranslationFilter@9ccd28a, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@6b9f173b]
|
|
2023-10-16 15:33:30,468 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@23a970a1
|
|
2023-10-16 15:33:30,468 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6a89c2815 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:30,494 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@28ee873b9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:30,497 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@212b79775 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:33:30,513 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@496f398b9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:33:30,652 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:33:30,653 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:33:30,794 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:33:30,804 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.096 seconds (JVM running for 823.271)
|
|
2023-10-16 15:33:30,806 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:34:53,551 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:34:53,551 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:34:53,551 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:34:53,984 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 15:34:53,984 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@545081e95 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:34:54,062 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1b4a66459 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:34:54,076 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:34:54,089 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:34:54,309 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:34:54,329 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:34:54,334 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:34:54,344 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:34:54,370 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:34:54,371 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:34:54,371 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:34:54,371 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:34:54,371 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:34:54,381 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@76248151, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@24abced1, org.springframework.security.web.context.SecurityContextPersistenceFilter@17fc4148, org.springframework.security.web.header.HeaderWriterFilter@4df02cf1, org.springframework.web.filter.CorsFilter@7945e808, org.springframework.security.web.csrf.CsrfFilter@4cae20fe, org.springframework.security.web.authentication.logout.LogoutFilter@278c2d04, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@212b6666, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@208faf73, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@83b5cd8, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@753e9e1c, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@39e5b3ee, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@79820900, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@cc6def9, org.springframework.security.web.session.SessionManagementFilter@2ae82d3b, org.springframework.security.web.access.ExceptionTranslationFilter@304a4d56, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@22a1d89b]
|
|
2023-10-16 15:34:54,389 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@6aed141b
|
|
2023-10-16 15:34:54,390 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@611a94505 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:34:54,487 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@28d852319 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:34:54,490 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@74867b4e5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:34:54,529 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7649e4099 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:34:54,683 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:34:54,684 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:34:54,826 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:34:54,835 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.339 seconds (JVM running for 907.303)
|
|
2023-10-16 15:34:54,838 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:34:56,480 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:34:56,480 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:34:56,480 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:34:56,994 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@cef3b305 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:34:57,146 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@37051baf9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:34:57,156 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:34:57,170 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:34:57,404 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:34:57,425 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:34:57,429 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:34:57,440 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:34:57,466 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:34:57,467 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:34:57,467 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:34:57,467 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:34:57,467 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:34:57,467 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:34:57,476 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@3f89118a, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@5c4283e4, org.springframework.security.web.context.SecurityContextPersistenceFilter@5b177b6e, org.springframework.security.web.header.HeaderWriterFilter@4a17872a, org.springframework.web.filter.CorsFilter@42d3cba8, org.springframework.security.web.csrf.CsrfFilter@4e406d5b, org.springframework.security.web.authentication.logout.LogoutFilter@30e65efe, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@70a15922, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4eec6df3, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@6ac13d32, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@37c1b0fc, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@41195ff9, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@716cfe6a, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@451b3842, org.springframework.security.web.session.SessionManagementFilter@16f0e65e, org.springframework.security.web.access.ExceptionTranslationFilter@196eba9a, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@7dfed05c]
|
|
2023-10-16 15:34:57,483 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@d3a2520
|
|
2023-10-16 15:34:57,484 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5ea6f4355 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:34:57,511 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@55b86a149 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:34:57,514 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@55c1e4dd5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:34:57,534 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@90ed8609 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:34:57,672 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:34:57,673 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:34:57,800 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:34:57,810 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.386 seconds (JVM running for 910.277)
|
|
2023-10-16 15:34:57,812 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 15:34:59,366 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 15:34:59,367 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 15:34:59,367 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 15:34:59,753 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@23ed97035 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:34:59,781 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2d4bfd929 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:34:59,791 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 15:34:59,806 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 15:35:00,136 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 15:35:00,160 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 15:35:00,165 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 15:35:00,178 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 15:35:00,206 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 15:35:00,207 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 15:35:00,207 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 15:35:00,207 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 15:35:00,207 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 15:35:00,207 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 15:35:00,207 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 15:35:00,217 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@5213af62, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@5a59c2fd, org.springframework.security.web.context.SecurityContextPersistenceFilter@1b91d084, org.springframework.security.web.header.HeaderWriterFilter@26856263, org.springframework.web.filter.CorsFilter@d90d554, org.springframework.security.web.csrf.CsrfFilter@2a2933cb, org.springframework.security.web.authentication.logout.LogoutFilter@7b1c588d, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@223565fa, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@502df2fb, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@43e96578, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@330be2df, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@3e1008a7, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@655c4967, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@5b000b4d, org.springframework.security.web.session.SessionManagementFilter@7845132c, org.springframework.security.web.access.ExceptionTranslationFilter@762bc33a, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@4409f5f6]
|
|
2023-10-16 15:35:00,224 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@3d4d4f4f
|
|
2023-10-16 15:35:00,224 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5f0303fd5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:35:00,252 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1e1dd4099 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:35:00,255 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@69af95735 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 15:35:00,275 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3ecf983e9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 15:35:00,411 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 15:35:00,411 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 15:35:00,539 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 15:35:00,549 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.211 seconds (JVM running for 913.016)
|
|
2023-10-16 15:35:00,551 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:04:17,946 DEBUG [XNIO-61 task-1] FilterChainProxy: Securing GET /src_main_webapp_app_admin_admin-routing_module_ts.js
|
|
2023-10-16 16:04:17,947 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:17,948 DEBUG [XNIO-61 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:17,948 DEBUG [XNIO-61 task-1] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:17,948 DEBUG [XNIO-61 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_app_admin_admin-routing_module_ts.js]
|
|
2023-10-16 16:04:17,948 DEBUG [XNIO-61 task-1] FilterChainProxy: Secured GET /src_main_webapp_app_admin_admin-routing_module_ts.js
|
|
2023-10-16 16:04:17,951 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:17,952 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:17,952 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:17,956 DEBUG [XNIO-61 task-1] FilterChainProxy: Securing GET /src_main_webapp_app_admin_docs_docs_module_ts.js
|
|
2023-10-16 16:04:17,957 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:17,957 DEBUG [XNIO-61 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:17,957 DEBUG [XNIO-61 task-1] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:17,957 DEBUG [XNIO-61 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_app_admin_docs_docs_module_ts.js]
|
|
2023-10-16 16:04:17,957 DEBUG [XNIO-61 task-1] FilterChainProxy: Secured GET /src_main_webapp_app_admin_docs_docs_module_ts.js
|
|
2023-10-16 16:04:17,959 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:17,959 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:17,959 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:17,988 DEBUG [XNIO-61 task-1] FilterChainProxy: Securing GET /swagger-ui/index.html
|
|
2023-10-16 16:04:17,988 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:17,988 DEBUG [XNIO-61 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:17,988 DEBUG [XNIO-61 task-1] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:17,989 DEBUG [XNIO-61 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/index.html] with attributes [permitAll]
|
|
2023-10-16 16:04:17,989 DEBUG [XNIO-61 task-1] FilterChainProxy: Secured GET /swagger-ui/index.html
|
|
2023-10-16 16:04:17,991 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:17,991 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:17,991 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:18,004 DEBUG [XNIO-61 task-1] FilterChainProxy: Securing GET /swagger-ui/swagger-ui.css
|
|
2023-10-16 16:04:18,005 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:18,005 DEBUG [XNIO-61 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:18,005 DEBUG [XNIO-61 task-1] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:18,005 DEBUG [XNIO-61 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui.css] with attributes [permitAll]
|
|
2023-10-16 16:04:18,006 DEBUG [XNIO-61 task-1] FilterChainProxy: Secured GET /swagger-ui/swagger-ui.css
|
|
2023-10-16 16:04:18,006 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing GET /swagger-ui/swagger-ui-bundle.js
|
|
2023-10-16 16:04:18,012 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:18,012 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /swagger-ui/axios.min.js
|
|
2023-10-16 16:04:18,012 DEBUG [XNIO-61 task-3] FilterChainProxy: Securing GET /swagger-ui/swagger-ui-standalone-preset.js
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-4] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-3] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-2] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-4] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:18,013 DEBUG [XNIO-61 task-3] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:18,014 DEBUG [XNIO-61 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui-bundle.js] with attributes [permitAll]
|
|
2023-10-16 16:04:18,014 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/axios.min.js] with attributes [permitAll]
|
|
2023-10-16 16:04:18,014 DEBUG [XNIO-61 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui-standalone-preset.js] with attributes [permitAll]
|
|
2023-10-16 16:04:18,014 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /swagger-ui/axios.min.js
|
|
2023-10-16 16:04:18,014 DEBUG [XNIO-61 task-2] FilterChainProxy: Secured GET /swagger-ui/swagger-ui-bundle.js
|
|
2023-10-16 16:04:18,014 DEBUG [XNIO-61 task-3] FilterChainProxy: Secured GET /swagger-ui/swagger-ui-standalone-preset.js
|
|
2023-10-16 16:04:18,015 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,017 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,017 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,017 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,017 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,017 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:18,017 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,017 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:18,021 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,021 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:18,023 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store anonymous SecurityContext
|
|
2023-10-16 16:04:18,023 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:18,165 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing GET /management/jhiopenapigroups
|
|
2023-10-16 16:04:18,165 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:18,165 DEBUG [XNIO-61 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:18,165 DEBUG [XNIO-61 task-2] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:18,170 DEBUG [XNIO-61 task-2] FilterSecurityInterceptor: Failed to authorize filter invocation [GET /management/jhiopenapigroups] with attributes [hasAuthority('ROLE_ADMIN')]
|
|
2023-10-16 16:04:18,173 WARN [XNIO-61 task-2] AdviceTraits: Unauthorized: Full authentication is required to access this resource
|
|
2023-10-16 16:04:18,181 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:04:18,181 WARN [XNIO-61 task-2] ExceptionHandlerExceptionResolver: Resolved [org.springframework.security.authentication.InsufficientAuthenticationException: Full authentication is required to access this resource]
|
|
2023-10-16 16:04:18,181 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:04:18,181 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:23,859 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing POST /api/logout
|
|
2023-10-16 16:04:23,859 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:23,860 DEBUG [XNIO-61 task-2] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:04:23,860 DEBUG [XNIO-61 task-2] SessionManagementFilter: Request requested invalid session id ogW2PZiiUP4XvnX3Mk2sQ4ssDFHI6EmDgEktFayD
|
|
2023-10-16 16:04:23,865 DEBUG [XNIO-61 task-2] FilterSecurityInterceptor: Failed to authorize filter invocation [POST /api/logout] with attributes [authenticated]
|
|
2023-10-16 16:04:23,866 WARN [XNIO-61 task-2] AdviceTraits: Unauthorized: Full authentication is required to access this resource
|
|
2023-10-16 16:04:23,866 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:04:23,867 WARN [XNIO-61 task-2] ExceptionHandlerExceptionResolver: Resolved [org.springframework.security.authentication.InsufficientAuthenticationException: Full authentication is required to access this resource]
|
|
2023-10-16 16:04:23,867 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:04:23,867 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:23,907 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing GET /oauth2/authorization/oidc
|
|
2023-10-16 16:04:23,907 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:23,909 DEBUG [XNIO-61 task-2] DefaultRedirectStrategy: Redirecting to https://accounts.dev.d4science.org/auth/realms/d4science/protocol/openid-connect/auth?response_type=code&client_id=pc-paratore.isti.cnr.it&scope=openid%20profile%20email%20phone%20offline_access&state=MGn7ajP5Cv68wSAUx0-aAv22pGfyXfFqz17AEtJ-NRw%3D&redirect_uri=http://localhost:8080/login/oauth2/code/oidc&nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU
|
|
2023-10-16 16:04:23,909 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:04:23,910 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:04:23,910 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,146 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing GET /login/oauth2/code/oidc?state=MGn7ajP5Cv68wSAUx0-aAv22pGfyXfFqz17AEtJ-NRw%3D&session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3&code=1940326e-c01d-4995-af05-d789239c73b4.2b9d6128-7d9f-4c41-8984-fe01cd3723e3.4f47f28a-2d6d-41e0-b695-f7b6c2ca83f9
|
|
2023-10-16 16:04:26,146 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:04:26,190 DEBUG [XNIO-61 task-2] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:04:26,190 DEBUG [XNIO-61 task-2] HttpURLConnection: sun.net.www.MessageHeader@1d1fee4f8 pairs: {POST /auth/realms/d4science/protocol/openid-connect/token HTTP/1.1: null}{Accept: application/json;charset=UTF-8}{Content-Type: application/x-www-form-urlencoded;charset=UTF-8}{Authorization: Basic cGMtcGFyYXRvcmUuaXN0aS5jbnIuaXQ6TGx5RlB0amxIZHY5NVBRM3diN3JZcDBQVlZESzJmTmo=}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}{Content-Length: 219}
|
|
2023-10-16 16:04:26,314 DEBUG [XNIO-61 task-2] HttpURLConnection: sun.net.www.MessageHeader@f7a7a8010 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-store}{x-content-type-options: nosniff}{pragma: no-cache}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 5077}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:04:26,319 DEBUG [XNIO-61 task-2] HttpURLConnection: sun.net.www.MessageHeader@7f2e5f2e5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:04:26,338 DEBUG [XNIO-61 task-2] HttpURLConnection: sun.net.www.MessageHeader@4ca3ef209 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:04:26,341 DEBUG [XNIO-61 task-2] HttpURLConnection: sun.net.www.MessageHeader@2eac0d6d6 pairs: {GET /auth/realms/d4science/protocol/openid-connect/userinfo HTTP/1.1: null}{Accept: application/json}{Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.U0vvayDwOBPHeKvTE2-QmfP9EvwGLKlo9jN2AOO360jXn15i6S_6LuLfaV5ksSFIRYyPfYuirqYoEDt6rJVbgBuPB_MfOUOzkQinpCq0aGtjYVTttEveWKi_p8VNoWTUbwRSQo1IN47-dxYN9VFBI7lAgrZOjefIYGjZkf_4xtuKzjyl9JFI63e6yl4T544Ei3Pz_jvB4Wma9soDMwLhtbUGdaWAanoAYI2AcflkYMBUxRRUJwBDxGrXXrSd-_xd0aANsaD7aNFeVdPvTmBpOVA7KViD58JZhd2JsICyvvs3p5PxT7kOgZAqlaWfM3kCzS0PVSdOY2BEXkcasuK_OQ}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:04:26,363 DEBUG [XNIO-61 task-2] HttpURLConnection: sun.net.www.MessageHeader@72decc429 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 663}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:04:26,364 DEBUG [XNIO-61 task-2] SecurityConfiguration: Authorities: [ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]
|
|
2023-10-16 16:04:26,365 DEBUG [XNIO-61 task-2] SecurityConfiguration: Authority: ROLE_USER
|
|
2023-10-16 16:04:26,365 DEBUG [XNIO-61 task-2] SecurityConfiguration: TokenValue: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.G5upRY2aZYveQa_HugV3XoKb7b9Whr58rz0vSPH7bn4d6fmXjsZ6ffJ2FLugAaVI8_WPB1l69PUhIRc7OoQClOd5cncOrXCMIh4O_bQocbcA0jKMzGN1AGzWJCmeLQqWuoBnLO0J2lIz9dvqBWxYSwsmgxsMv1KkoSg4EvNKrnty_E9CEYgWXulYEYIf5u0Z4QBh8g0PvYkbqpdwkWEZtpe5GYX3LdYKmgX8bBYUu_qrNLhG-4_tCXcIMKFNeVx82Qpu6lRy0zNd7SQfTBuJUJ-_iSnEVIPtiyj7ZkBH1TQ2CVBnx2CGXzt6F97sQnhupfHqrcEU2tHVExQ4EeE9Qw
|
|
2023-10-16 16:04:26,365 DEBUG [XNIO-61 task-2] SecurityConfiguration: oidcUserAuthority: ROLE_USER
|
|
2023-10-16 16:04:26,368 DEBUG [XNIO-61 task-2] SecurityUtils: extractAuthorityFromClaims: {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 16:04:26,368 DEBUG [XNIO-61 task-2] SecurityUtils: getRolesFromClaims(): {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 16:04:26,368 DEBUG [XNIO-61 task-2] SecurityUtils: ResourceAccess: class java.util.LinkedHashMap
|
|
2023-10-16 16:04:26,368 INFO [XNIO-61 task-2] SecurityUtils: Default Scope: %2Fgcube
|
|
2023-10-16 16:04:26,368 INFO [XNIO-61 task-2] SecurityUtils: D4Science Roles: [Member]
|
|
2023-10-16 16:04:26,368 DEBUG [XNIO-61 task-2] SecurityUtils: mapRolesToGrantedAuthorities(): [Member]
|
|
2023-10-16 16:04:26,369 INFO [XNIO-61 task-2] SecurityUtils: GrantedAuthority: [ROLE_ADMIN]
|
|
2023-10-16 16:04:26,369 DEBUG [XNIO-61 task-2] SecurityConfiguration: Authority: SCOPE_email
|
|
2023-10-16 16:04:26,369 DEBUG [XNIO-61 task-2] SecurityConfiguration: Authority: SCOPE_offline_access
|
|
2023-10-16 16:04:26,369 DEBUG [XNIO-61 task-2] SecurityConfiguration: Authority: SCOPE_openid
|
|
2023-10-16 16:04:26,369 DEBUG [XNIO-61 task-2] SecurityConfiguration: Authority: SCOPE_phone
|
|
2023-10-16 16:04:26,369 DEBUG [XNIO-61 task-2] SecurityConfiguration: Authority: SCOPE_profile
|
|
2023-10-16 16:04:26,369 DEBUG [XNIO-61 task-2] ChangeSessionIdAuthenticationStrategy: Changed session id from S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r
|
|
2023-10-16 16:04:26,369 DEBUG [XNIO-61 task-2] CsrfAuthenticationStrategy: Replaced CSRF Token
|
|
2023-10-16 16:04:26,370 DEBUG [XNIO-61 task-2] OAuth2LoginAuthenticationFilter: Set SecurityContextHolder to OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]
|
|
2023-10-16 16:04:26,370 DEBUG [XNIO-61 task-2] DefaultRedirectStrategy: Redirecting to /
|
|
2023-10-16 16:04:26,370 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@aeb6e1df]
|
|
2023-10-16 16:04:26,371 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@aeb6e1df]
|
|
2023-10-16 16:04:26,371 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,373 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing GET /
|
|
2023-10-16 16:04:26,373 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,374 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,374 DEBUG [XNIO-61 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /]
|
|
2023-10-16 16:04:26,374 DEBUG [XNIO-61 task-2] FilterChainProxy: Secured GET /
|
|
2023-10-16 16:04:26,382 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,427 DEBUG [XNIO-61 task-3] FilterChainProxy: Securing GET /styles.css
|
|
2023-10-16 16:04:26,427 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing GET /content/css/loading.css
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-1] FilterChainProxy: Securing GET /runtime.js
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /polyfills.js
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,428 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,429 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,429 DEBUG [XNIO-61 task-5] FilterChainProxy: Securing GET /main.js
|
|
2023-10-16 16:04:26,429 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,429 DEBUG [XNIO-61 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /content/css/loading.css] with attributes [permitAll]
|
|
2023-10-16 16:04:26,429 DEBUG [XNIO-61 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /styles.css]
|
|
2023-10-16 16:04:26,429 DEBUG [XNIO-61 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /runtime.js]
|
|
2023-10-16 16:04:26,430 DEBUG [XNIO-61 task-2] FilterChainProxy: Secured GET /content/css/loading.css
|
|
2023-10-16 16:04:26,430 DEBUG [XNIO-61 task-3] FilterChainProxy: Secured GET /styles.css
|
|
2023-10-16 16:04:26,430 DEBUG [XNIO-61 task-1] FilterChainProxy: Secured GET /runtime.js
|
|
2023-10-16 16:04:26,430 DEBUG [XNIO-61 task-5] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,430 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /polyfills.js]
|
|
2023-10-16 16:04:26,430 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /polyfills.js
|
|
2023-10-16 16:04:26,430 DEBUG [XNIO-61 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,431 DEBUG [XNIO-61 task-5] FilterSecurityInterceptor: Authorized public object filter invocation [GET /main.js]
|
|
2023-10-16 16:04:26,431 DEBUG [XNIO-61 task-5] FilterChainProxy: Secured GET /main.js
|
|
2023-10-16 16:04:26,435 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,435 DEBUG [XNIO-61 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,435 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,438 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,440 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,456 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /content/images/logo-jhipster.png
|
|
2023-10-16 16:04:26,457 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,457 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,457 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /content/images/logo-jhipster.png] with attributes [permitAll]
|
|
2023-10-16 16:04:26,457 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /content/images/logo-jhipster.png
|
|
2023-10-16 16:04:26,459 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,510 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 16:04:26,510 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,510 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,511 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_bootstrap_ts.js]
|
|
2023-10-16 16:04:26,511 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 16:04:26,539 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,819 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 16:04:26,819 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,820 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,820 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7] with attributes [permitAll]
|
|
2023-10-16 16:04:26,820 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 16:04:26,823 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,825 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 16:04:26,825 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-3] FilterChainProxy: Securing GET /management/info
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /management/info] with attributes [permitAll]
|
|
2023-10-16 16:04:26,826 DEBUG [XNIO-61 task-3] FilterChainProxy: Secured GET /management/info
|
|
2023-10-16 16:04:26,828 DEBUG [XNIO-61 task-4] AccountResource: Enter: getAccount() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,830 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,831 DEBUG [XNIO-61 task-4] UserService: Enter: getUserFromAuthentication() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,834 DEBUG [XNIO-61 task-4] UserService: AuthToken is a OAuth2AuthenticationToken
|
|
2023-10-16 16:04:26,835 DEBUG [XNIO-61 task-4] UserService: Attributes: {at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}
|
|
2023-10-16 16:04:26,839 DEBUG [XNIO-61 task-4] UserService: Exit: getUserFromAuthentication() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 16:04:26,841 DEBUG [XNIO-61 task-4] AccountResource: Exit: getAccount() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 16:04:26,845 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:26,893 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /logo-jhipster.png
|
|
2023-10-16 16:04:26,893 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,893 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:26,893 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /logo-jhipster.png]
|
|
2023-10-16 16:04:26,894 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /logo-jhipster.png
|
|
2023-10-16 16:04:26,896 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,068 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /src_main_webapp_app_admin_admin-routing_module_ts.js
|
|
2023-10-16 16:04:30,068 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,069 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,069 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_app_admin_admin-routing_module_ts.js]
|
|
2023-10-16 16:04:30,069 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /src_main_webapp_app_admin_admin-routing_module_ts.js
|
|
2023-10-16 16:04:30,071 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,076 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /src_main_webapp_app_admin_docs_docs_module_ts.js
|
|
2023-10-16 16:04:30,077 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,077 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,077 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_app_admin_docs_docs_module_ts.js]
|
|
2023-10-16 16:04:30,077 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /src_main_webapp_app_admin_docs_docs_module_ts.js
|
|
2023-10-16 16:04:30,079 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,097 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /swagger-ui/index.html
|
|
2023-10-16 16:04:30,097 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,098 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,098 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/index.html] with attributes [permitAll]
|
|
2023-10-16 16:04:30,098 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /swagger-ui/index.html
|
|
2023-10-16 16:04:30,100 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,112 DEBUG [XNIO-61 task-4] FilterChainProxy: Securing GET /swagger-ui/swagger-ui.css
|
|
2023-10-16 16:04:30,112 DEBUG [XNIO-61 task-3] FilterChainProxy: Securing GET /swagger-ui/swagger-ui-bundle.js
|
|
2023-10-16 16:04:30,112 DEBUG [XNIO-61 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,112 DEBUG [XNIO-61 task-2] FilterChainProxy: Securing GET /swagger-ui/swagger-ui-standalone-preset.js
|
|
2023-10-16 16:04:30,112 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,113 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,113 DEBUG [XNIO-61 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,113 DEBUG [XNIO-61 task-1] FilterChainProxy: Securing GET /swagger-ui/axios.min.js
|
|
2023-10-16 16:04:30,113 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,113 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,113 DEBUG [XNIO-61 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui.css] with attributes [permitAll]
|
|
2023-10-16 16:04:30,124 DEBUG [XNIO-61 task-4] FilterChainProxy: Secured GET /swagger-ui/swagger-ui.css
|
|
2023-10-16 16:04:30,124 DEBUG [XNIO-61 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,124 DEBUG [XNIO-61 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui-bundle.js] with attributes [permitAll]
|
|
2023-10-16 16:04:30,124 DEBUG [XNIO-61 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui-standalone-preset.js] with attributes [permitAll]
|
|
2023-10-16 16:04:30,125 DEBUG [XNIO-61 task-3] FilterChainProxy: Secured GET /swagger-ui/swagger-ui-bundle.js
|
|
2023-10-16 16:04:30,125 DEBUG [XNIO-61 task-2] FilterChainProxy: Secured GET /swagger-ui/swagger-ui-standalone-preset.js
|
|
2023-10-16 16:04:30,125 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,125 DEBUG [XNIO-61 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/axios.min.js] with attributes [permitAll]
|
|
2023-10-16 16:04:30,126 DEBUG [XNIO-61 task-1] FilterChainProxy: Secured GET /swagger-ui/axios.min.js
|
|
2023-10-16 16:04:30,126 DEBUG [XNIO-61 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,127 DEBUG [XNIO-61 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,128 DEBUG [XNIO-61 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,129 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,290 DEBUG [XNIO-61 task-3] FilterChainProxy: Securing GET /management/jhiopenapigroups
|
|
2023-10-16 16:04:30,291 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,291 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,292 DEBUG [XNIO-61 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /management/jhiopenapigroups] with attributes [hasAuthority('ROLE_ADMIN')]
|
|
2023-10-16 16:04:30,292 DEBUG [XNIO-61 task-3] FilterChainProxy: Secured GET /management/jhiopenapigroups
|
|
2023-10-16 16:04:30,294 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:30,317 DEBUG [XNIO-61 task-3] FilterChainProxy: Securing GET /v3/api-docs/springdocDefault
|
|
2023-10-16 16:04:30,317 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,318 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:30,318 DEBUG [XNIO-61 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /v3/api-docs/springdocDefault]
|
|
2023-10-16 16:04:30,318 DEBUG [XNIO-61 task-3] FilterChainProxy: Secured GET /v3/api-docs/springdocDefault
|
|
2023-10-16 16:04:30,524 INFO [XNIO-61 task-3] AbstractOpenApiResource: Init duration for springdoc-openapi is: 200 ms
|
|
2023-10-16 16:04:30,540 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:04:40,047 DEBUG [XNIO-61 task-3] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 16:04:40,048 DEBUG [XNIO-61 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:40,048 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:40,049 DEBUG [XNIO-61 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 16:04:40,049 DEBUG [XNIO-61 task-3] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 16:04:40,049 DEBUG [XNIO-61 task-3] AccountResource: Enter: getAccount() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:40,049 DEBUG [XNIO-61 task-3] UserService: Enter: getUserFromAuthentication() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=S4heZb0u7NdEC7xSlX2LNx5hcGVFAuxkOqxAJa4r], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:04:40,050 DEBUG [XNIO-61 task-3] UserService: AuthToken is a OAuth2AuthenticationToken
|
|
2023-10-16 16:04:40,050 DEBUG [XNIO-61 task-3] UserService: Attributes: {at_hash=-8xU-ax1jbomJf7ckHIBKQ, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=CBSHRMrNUHxiTmwmBHmRDyVAceGv1oKpBfIPwhiAhjU, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:34:26Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:04:26Z, email=mariateresa.paratore@isti.cnr.it, jti=f66b767c-4490-4942-ab82-168feb4f1d87}
|
|
2023-10-16 16:04:40,050 DEBUG [XNIO-61 task-3] UserService: Exit: getUserFromAuthentication() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 16:04:40,050 DEBUG [XNIO-61 task-3] AccountResource: Exit: getAccount() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 16:04:40,051 DEBUG [XNIO-61 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:16:21,093 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:16:21,093 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:16:21,094 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:16:21,597 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:16:21,598 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@15a6f10c5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:16:21,628 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7eed8f5a9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:16:21,689 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:16:21,722 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:16:22,084 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:16:22,108 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:16:22,114 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:16:22,131 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:16:22,173 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:16:22,174 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:16:22,174 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:16:22,174 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:16:22,174 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:16:22,174 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:16:22,185 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@2d97dc42, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@521057c9, org.springframework.security.web.context.SecurityContextPersistenceFilter@35cfe366, org.springframework.security.web.header.HeaderWriterFilter@380769e, org.springframework.web.filter.CorsFilter@1aaecf05, org.springframework.security.web.csrf.CsrfFilter@a2c6a23, org.springframework.security.web.authentication.logout.LogoutFilter@720b9652, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@2e875dbc, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@60fa01a6, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@2f8a0e4f, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@3bc4c5d0, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@3b7060b0, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@62579b1c, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@39e90c7e, org.springframework.security.web.session.SessionManagementFilter@5cdbf7ac, org.springframework.security.web.access.ExceptionTranslationFilter@692ce53a, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@68162b8c]
|
|
2023-10-16 16:16:22,196 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@46004616
|
|
2023-10-16 16:16:22,196 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@487749145 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:16:22,228 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1ac681299 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:16:22,231 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2253bc0d5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:16:22,253 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@66277ea79 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:16:22,468 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:16:22,470 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:16:22,672 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:16:22,684 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.646 seconds (JVM running for 3395.143)
|
|
2023-10-16 16:16:22,687 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:16:45,529 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:16:45,529 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:16:45,529 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:16:45,924 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:16:45,925 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@24c48cd55 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:16:45,951 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@e8dcf309 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:16:45,964 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:16:45,990 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:16:46,250 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:16:46,274 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:16:46,279 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:16:46,291 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:16:46,323 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:16:46,324 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:16:46,324 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:16:46,324 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:16:46,324 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:16:46,324 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:16:46,324 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:16:46,334 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@1ea20794, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@35388957, org.springframework.security.web.context.SecurityContextPersistenceFilter@3d729bbc, org.springframework.security.web.header.HeaderWriterFilter@47427244, org.springframework.web.filter.CorsFilter@19aa0e6e, org.springframework.security.web.csrf.CsrfFilter@5fa59074, org.springframework.security.web.authentication.logout.LogoutFilter@2000c119, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@53c2db84, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@232b1a98, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@c14e4ab, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2ff67eb0, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@7bf2f958, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@4e3cbab2, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@5bf9e994, org.springframework.security.web.session.SessionManagementFilter@4ea7942c, org.springframework.security.web.access.ExceptionTranslationFilter@14b0c4d6, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@4747eda4]
|
|
2023-10-16 16:16:46,342 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@3ba003f9
|
|
2023-10-16 16:16:46,342 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7929540f5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:16:46,370 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@36f8c6d9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:16:46,372 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4dbb31ac5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:16:46,391 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@763f4c299 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:16:46,537 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:16:46,537 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:16:46,682 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:16:46,692 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.211 seconds (JVM running for 3419.151)
|
|
2023-10-16 16:16:46,695 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:18:54,038 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:18:54,038 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:18:54,039 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:18:54,473 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:18:54,473 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3d98b0a65 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:18:54,497 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@10c016af9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:18:54,510 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:18:54,534 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:18:54,786 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:18:54,809 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:18:54,814 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:18:54,824 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:18:54,852 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:18:54,853 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:18:54,853 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:18:54,853 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:18:54,853 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:18:54,853 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:18:54,853 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:18:54,853 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:18:54,865 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@5fcfb273, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@507807af, org.springframework.security.web.context.SecurityContextPersistenceFilter@7b3ab90, org.springframework.security.web.header.HeaderWriterFilter@3908df50, org.springframework.web.filter.CorsFilter@7ed6e371, org.springframework.security.web.csrf.CsrfFilter@411ea88b, org.springframework.security.web.authentication.logout.LogoutFilter@66369ecc, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@74dfd606, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@7169b26e, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@674d0eb3, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@58740116, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@27f9a717, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@6c3e350c, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@55aa2126, org.springframework.security.web.session.SessionManagementFilter@33dd1790, org.springframework.security.web.access.ExceptionTranslationFilter@2e8e32d2, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@1c77120f]
|
|
2023-10-16 16:18:54,874 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@5640dd4f
|
|
2023-10-16 16:18:54,875 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@77177b5a5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:18:54,902 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2770c1159 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:18:54,904 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1794304a5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:18:54,921 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@476e3d529 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:18:55,072 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:18:55,072 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:18:55,223 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:18:55,236 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.256 seconds (JVM running for 3547.696)
|
|
2023-10-16 16:18:55,239 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:19:43,530 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:19:43,530 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:19:43,530 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:19:43,888 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:19:43,888 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@416c77c85 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:19:43,920 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@115803219 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:19:43,934 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:19:43,963 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:19:44,304 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:19:44,333 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:19:44,339 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:19:44,352 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:19:44,388 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:19:44,389 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:19:44,402 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@4428d991, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@70779649, org.springframework.security.web.context.SecurityContextPersistenceFilter@1f938519, org.springframework.security.web.header.HeaderWriterFilter@90bb909, org.springframework.web.filter.CorsFilter@7e12ec62, org.springframework.security.web.csrf.CsrfFilter@3d6dc26e, org.springframework.security.web.authentication.logout.LogoutFilter@14994719, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@17a65a58, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@6e802ffd, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@75c83461, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@7db46751, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@29234a1f, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@1fe7b07d, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@61f93b6c, org.springframework.security.web.session.SessionManagementFilter@4cbe5052, org.springframework.security.web.access.ExceptionTranslationFilter@4c65c40e, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@778f1f2e]
|
|
2023-10-16 16:19:44,411 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@7ef9f5f7
|
|
2023-10-16 16:19:44,412 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4dda51b25 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:19:44,444 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@37840e3b9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:19:44,445 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4eedbec35 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:19:44,467 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7f0abca49 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:19:44,608 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:19:44,609 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:19:44,734 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:19:44,744 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.357 seconds (JVM running for 3597.205)
|
|
2023-10-16 16:19:44,746 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:21:43,470 DEBUG [XNIO-65 task-1] FilterChainProxy: Securing GET /api/context/all
|
|
2023-10-16 16:21:43,471 DEBUG [XNIO-65 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:21:43,471 DEBUG [XNIO-65 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:21:43,471 DEBUG [XNIO-65 task-1] SessionManagementFilter: Request requested invalid session id vBXW2YCkXzKsTYk_mv9RygsmUQcX4t4qujfseldE
|
|
2023-10-16 16:21:43,473 DEBUG [XNIO-65 task-1] FilterSecurityInterceptor: Failed to authorize filter invocation [GET /api/context/all] with attributes [authenticated]
|
|
2023-10-16 16:21:43,476 DEBUG [XNIO-65 task-1] HttpSessionRequestCache: Saved request http://localhost:8080/api/context/all to session
|
|
2023-10-16 16:21:43,477 WARN [XNIO-65 task-1] AdviceTraits: Unauthorized: Full authentication is required to access this resource
|
|
2023-10-16 16:21:43,482 DEBUG [XNIO-65 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:21:43,482 WARN [XNIO-65 task-1] ExceptionHandlerExceptionResolver: Resolved [org.springframework.security.authentication.InsufficientAuthenticationException: Full authentication is required to access this resource]
|
|
2023-10-16 16:21:43,483 DEBUG [XNIO-65 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:21:43,483 DEBUG [XNIO-65 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:28:30,615 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:28:30,615 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:28:30,615 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:28:32,485 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:28:32,487 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@3dfbd5a65 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:28:32,513 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@a45aadc9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:28:32,578 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:28:32,622 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:28:33,845 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:28:33,938 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:28:33,950 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:28:33,977 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:28:34,079 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:28:34,080 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:28:34,080 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:28:34,080 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:28:34,080 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:28:34,081 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:28:34,081 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:28:34,081 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:28:34,082 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:28:34,082 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:28:34,082 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:28:34,083 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:28:34,083 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:28:34,083 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:28:34,083 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:28:34,084 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:28:34,084 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:28:34,112 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@223bf56, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@1bb14f15, org.springframework.security.web.context.SecurityContextPersistenceFilter@33f23f96, org.springframework.security.web.header.HeaderWriterFilter@32ac1209, org.springframework.web.filter.CorsFilter@16add4e6, org.springframework.security.web.csrf.CsrfFilter@3e550d6d, org.springframework.security.web.authentication.logout.LogoutFilter@76af151b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@77496a9d, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@4745eec9, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@39d41bfc, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@70c06161, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@222e192a, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@73eac90c, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@3e823799, org.springframework.security.web.session.SessionManagementFilter@255a6035, org.springframework.security.web.access.ExceptionTranslationFilter@26bcb9b0, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@5b845757]
|
|
2023-10-16 16:28:34,155 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@7a2739d9
|
|
2023-10-16 16:28:34,158 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@8dd19205 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:28:34,181 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@2a0edb499 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:28:34,193 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@11c1090a5 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:28:34,211 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@52eb031a9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:28:34,714 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:28:34,718 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:28:35,412 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:28:35,448 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 4.939 seconds (JVM running for 4127.856)
|
|
2023-10-16 16:28:35,460 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:28:37,956 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:28:37,957 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:28:37,957 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:28:38,351 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@20acd6795 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:28:38,370 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@496365de9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:28:38,382 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:28:38,398 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:28:38,682 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:28:38,707 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:28:38,712 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:28:38,727 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:28:38,763 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:28:38,776 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@52bf6898, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@5cf1225b, org.springframework.security.web.context.SecurityContextPersistenceFilter@49b9f5a, org.springframework.security.web.header.HeaderWriterFilter@4accf05, org.springframework.web.filter.CorsFilter@5e73044d, org.springframework.security.web.csrf.CsrfFilter@3191cc7a, org.springframework.security.web.authentication.logout.LogoutFilter@6b6c6210, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@1bd00c0e, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@6520b7d4, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@2b44a094, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@590fc7cb, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@3b39ff08, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@3c8fa006, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@4994bdd8, org.springframework.security.web.session.SessionManagementFilter@3bd66646, org.springframework.security.web.access.ExceptionTranslationFilter@75850993, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@6169be26]
|
|
2023-10-16 16:28:38,786 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@3f837b3b
|
|
2023-10-16 16:28:38,786 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@40fa3f225 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:28:38,812 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1fbea6c29 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:28:38,815 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@13e3b4d35 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:28:38,833 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@371d5f379 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:28:38,986 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:28:38,987 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:28:39,153 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:28:39,166 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.246 seconds (JVM running for 4131.574)
|
|
2023-10-16 16:28:39,170 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:29:46,674 DEBUG [XNIO-67 task-1] FilterChainProxy: Securing GET /api/context/all
|
|
2023-10-16 16:29:46,675 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:29:46,675 DEBUG [XNIO-67 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:29:46,675 DEBUG [XNIO-67 task-1] SessionManagementFilter: Request requested invalid session id 2RCJyJA0D7Xff3aRHSU8TqRGvBeqg5xelXYyuVTu
|
|
2023-10-16 16:29:46,677 DEBUG [XNIO-67 task-1] FilterSecurityInterceptor: Failed to authorize filter invocation [GET /api/context/all] with attributes [authenticated]
|
|
2023-10-16 16:29:46,678 DEBUG [XNIO-67 task-1] HttpSessionRequestCache: Saved request http://localhost:8080/api/context/all to session
|
|
2023-10-16 16:29:46,679 WARN [XNIO-67 task-1] AdviceTraits: Unauthorized: Full authentication is required to access this resource
|
|
2023-10-16 16:29:46,683 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:29:46,683 WARN [XNIO-67 task-1] ExceptionHandlerExceptionResolver: Resolved [org.springframework.security.authentication.InsufficientAuthenticationException: Full authentication is required to access this resource]
|
|
2023-10-16 16:29:46,683 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:29:46,684 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:29:49,949 DEBUG [XNIO-67 task-1] FilterChainProxy: Securing POST /api/logout
|
|
2023-10-16 16:29:49,950 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:29:49,950 DEBUG [XNIO-67 task-1] AnonymousAuthenticationFilter: Set SecurityContextHolder to anonymous SecurityContext
|
|
2023-10-16 16:29:49,951 DEBUG [XNIO-67 task-1] FilterSecurityInterceptor: Failed to authorize filter invocation [POST /api/logout] with attributes [authenticated]
|
|
2023-10-16 16:29:49,951 WARN [XNIO-67 task-1] AdviceTraits: Unauthorized: Full authentication is required to access this resource
|
|
2023-10-16 16:29:49,952 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:29:49,952 WARN [XNIO-67 task-1] ExceptionHandlerExceptionResolver: Resolved [org.springframework.security.authentication.InsufficientAuthenticationException: Full authentication is required to access this resource]
|
|
2023-10-16 16:29:49,952 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:29:49,952 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:29:49,998 DEBUG [XNIO-67 task-1] FilterChainProxy: Securing GET /oauth2/authorization/oidc
|
|
2023-10-16 16:29:49,998 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:29:49,999 DEBUG [XNIO-67 task-1] DefaultRedirectStrategy: Redirecting to https://accounts.dev.d4science.org/auth/realms/d4science/protocol/openid-connect/auth?response_type=code&client_id=pc-paratore.isti.cnr.it&scope=openid%20profile%20email%20phone%20offline_access&state=UdAo5JmftEmm4eAk2cC2dhT5VeaYW2BZI8rhPbMgtpM%3D&redirect_uri=http://localhost:8080/login/oauth2/code/oidc&nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k
|
|
2023-10-16 16:29:49,999 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:29:49,999 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Did not store empty SecurityContext
|
|
2023-10-16 16:29:49,999 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:29:50,194 DEBUG [XNIO-67 task-1] FilterChainProxy: Securing GET /login/oauth2/code/oidc?state=UdAo5JmftEmm4eAk2cC2dhT5VeaYW2BZI8rhPbMgtpM%3D&session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3&code=07b4d066-d65b-464f-ae9e-7a169a5182c4.2b9d6128-7d9f-4c41-8984-fe01cd3723e3.4f47f28a-2d6d-41e0-b695-f7b6c2ca83f9
|
|
2023-10-16 16:29:50,194 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to empty SecurityContext
|
|
2023-10-16 16:29:50,232 DEBUG [XNIO-67 task-1] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:29:50,233 DEBUG [XNIO-67 task-1] HttpURLConnection: sun.net.www.MessageHeader@292d08948 pairs: {POST /auth/realms/d4science/protocol/openid-connect/token HTTP/1.1: null}{Accept: application/json;charset=UTF-8}{Content-Type: application/x-www-form-urlencoded;charset=UTF-8}{Authorization: Basic cGMtcGFyYXRvcmUuaXN0aS5jbnIuaXQ6TGx5RlB0amxIZHY5NVBRM3diN3JZcDBQVlZESzJmTmo=}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}{Content-Length: 219}
|
|
2023-10-16 16:29:50,410 DEBUG [XNIO-67 task-1] HttpURLConnection: sun.net.www.MessageHeader@39260f7310 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-store}{x-content-type-options: nosniff}{pragma: no-cache}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 5077}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:29:50,413 DEBUG [XNIO-67 task-1] HttpURLConnection: sun.net.www.MessageHeader@736c03245 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:29:50,429 DEBUG [XNIO-67 task-1] HttpURLConnection: sun.net.www.MessageHeader@12d7b5f49 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:29:50,432 DEBUG [XNIO-67 task-1] HttpURLConnection: sun.net.www.MessageHeader@49cdfb5b6 pairs: {GET /auth/realms/d4science/protocol/openid-connect/userinfo HTTP/1.1: null}{Accept: application/json}{Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.V1U05Z7BPe9eP68kS7vkTtmwXqb3X18tuG7gp23rhEv5MbBTdLE7HneBf-RcLNZ9N0pCIRe2FgVbGAsc4i5lG8GhN60LBUsLxIJkBVTIsOT7LYyEDsuIEAOzWD9eQjHnBEA9pZAHUXzQJET3A26dVm-3Jxu-Cemx5uLahvhknc6ppjreQ587Fzn07MuCqiErIrF-TZBtfL4LOpw-OeQ0fJLb54FeKa1VpJf6HEU2w5E91uGOKyCzqyKoW5Ju86e9itaf_cMB50G0TWyjMojlkWtQubJzKPv9ex3phYfJRbG6miopEKDgluCBHYOp3Mp6UtbIWUn0cAKNyREwpgUsrg}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:29:50,451 DEBUG [XNIO-67 task-1] HttpURLConnection: sun.net.www.MessageHeader@669a8f839 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 663}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:29:50,453 DEBUG [XNIO-67 task-1] SecurityConfiguration: Authorities: [ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]
|
|
2023-10-16 16:29:50,454 DEBUG [XNIO-67 task-1] SecurityConfiguration: Authority: ROLE_USER
|
|
2023-10-16 16:29:50,454 DEBUG [XNIO-67 task-1] SecurityConfiguration: TokenValue: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.LYBn954X8i8HWDOU1u0GwipKoSbHIhW3P22SHbAX8S5bOHmvZQHOjAMYc7Bqva1SOTGw72hcCBr-2SgvxfnW6626P7uDY2bslM70VciOcj6K8yj5CzauvXbDjnq_VXLs68sj6XYDFOoDxuBD7l4zmVNQqzvw_BV_gYWccbltfqCOEYVnyn48921gsIW2NimHpaqbf6dimWyyRqWilne1aMOIpLtR7cd3dUdZoC8V8GzitMu5afoLx0SPU9VlfCh-urIJKHspMpWtFz8ktIAYFo3UMDY2Ttv87W6cTLVVIT_LcPFSu6XQsRo259piwI1-kiQ6IboTcxxTHrsZ66U24A
|
|
2023-10-16 16:29:50,454 DEBUG [XNIO-67 task-1] SecurityConfiguration: oidcUserAuthority: ROLE_USER
|
|
2023-10-16 16:29:50,455 DEBUG [XNIO-67 task-1] SecurityUtils: extractAuthorityFromClaims: {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityUtils: getRolesFromClaims(): {sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={%2Fgcube={roles=[Member]}, %2Fgcube%2Fdevsec={roles=[Member]}, %2Fgcube%2FdevNext%2FNextNext={roles=[Member]}, %2Fgcube%2Fdevsec%2FdevVRE={roles=[Catalogue-Editor, Member]}, %2Fgcube%2FdevNext={roles=[Member]}, account={roles=[manage-account, manage-account-links, view-profile]}}, email_verified=true, realm_access={roles=[default-roles-d4science, offline_access, uma_authorization]}, name=Maria Teresa Paratore, preferred_username=mariateresa.paratore, given_name=Maria Teresa, family_name=Paratore, email=mariateresa.paratore@isti.cnr.it}
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityUtils: ResourceAccess: class java.util.LinkedHashMap
|
|
2023-10-16 16:29:50,456 INFO [XNIO-67 task-1] SecurityUtils: Default Scope: %2Fgcube
|
|
2023-10-16 16:29:50,456 INFO [XNIO-67 task-1] SecurityUtils: D4Science Roles: [Member]
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityUtils: mapRolesToGrantedAuthorities(): [Member]
|
|
2023-10-16 16:29:50,456 INFO [XNIO-67 task-1] SecurityUtils: GrantedAuthority: [ROLE_ADMIN]
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityConfiguration: Authority: SCOPE_email
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityConfiguration: Authority: SCOPE_offline_access
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityConfiguration: Authority: SCOPE_openid
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityConfiguration: Authority: SCOPE_phone
|
|
2023-10-16 16:29:50,456 DEBUG [XNIO-67 task-1] SecurityConfiguration: Authority: SCOPE_profile
|
|
2023-10-16 16:29:50,457 DEBUG [XNIO-67 task-1] ChangeSessionIdAuthenticationStrategy: Changed session id from LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-
|
|
2023-10-16 16:29:50,457 DEBUG [XNIO-67 task-1] CsrfAuthenticationStrategy: Replaced CSRF Token
|
|
2023-10-16 16:29:50,457 DEBUG [XNIO-67 task-1] OAuth2LoginAuthenticationFilter: Set SecurityContextHolder to OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]
|
|
2023-10-16 16:29:50,458 DEBUG [XNIO-67 task-1] DefaultRedirectStrategy: Redirecting to http://localhost:8080/api/context/all
|
|
2023-10-16 16:29:50,458 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@9df01c57]
|
|
2023-10-16 16:29:50,458 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Stored SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]] to HttpSession [io.undertow.servlet.spec.HttpSessionImpl@9df01c57]
|
|
2023-10-16 16:29:50,459 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:29:50,461 DEBUG [XNIO-67 task-1] FilterChainProxy: Securing GET /api/context/all
|
|
2023-10-16 16:29:50,461 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:29:50,461 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:29:50,461 DEBUG [XNIO-67 task-1] HttpSessionRequestCache: Loaded matching saved request http://localhost:8080/api/context/all
|
|
2023-10-16 16:29:50,462 DEBUG [XNIO-67 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /api/context/all] with attributes [authenticated]
|
|
2023-10-16 16:29:50,462 DEBUG [XNIO-67 task-1] FilterChainProxy: Secured GET /api/context/all
|
|
2023-10-16 16:29:50,464 DEBUG [XNIO-67 task-1] ContextResource: Enter: all() with argument[s] = []
|
|
2023-10-16 16:29:50,466 DEBUG [XNIO-67 task-1] ContextResource: Request Scope Discovery
|
|
2023-10-16 16:29:50,466 DEBUG [XNIO-67 task-1] ContextResource: OAuth2AuthenticationToken: OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]
|
|
2023-10-16 16:29:50,467 DEBUG [XNIO-67 task-1] ContextResource: AccessToken: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.V1U05Z7BPe9eP68kS7vkTtmwXqb3X18tuG7gp23rhEv5MbBTdLE7HneBf-RcLNZ9N0pCIRe2FgVbGAsc4i5lG8GhN60LBUsLxIJkBVTIsOT7LYyEDsuIEAOzWD9eQjHnBEA9pZAHUXzQJET3A26dVm-3Jxu-Cemx5uLahvhknc6ppjreQ587Fzn07MuCqiErIrF-TZBtfL4LOpw-OeQ0fJLb54FeKa1VpJf6HEU2w5E91uGOKyCzqyKoW5Ju86e9itaf_cMB50G0TWyjMojlkWtQubJzKPv9ex3phYfJRbG6miopEKDgluCBHYOp3Mp6UtbIWUn0cAKNyREwpgUsrg
|
|
2023-10-16 16:29:50,467 DEBUG [XNIO-67 task-1] ContextService: Enter: all() with argument[s] = []
|
|
2023-10-16 16:29:50,469 DEBUG [XNIO-67 task-1] ContextService: Scopes found: [gcube, gcube/devsec, gcube/devsec/devVRE]
|
|
2023-10-16 16:29:50,469 DEBUG [XNIO-67 task-1] ContextService: ********************
|
|
2023-10-16 16:29:50,469 DEBUG [XNIO-67 task-1] ContextService: *****dettagli utenti: Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}]
|
|
2023-10-16 16:29:50,470 DEBUG [XNIO-67 task-1] ContextService: *****Provaci: WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-]
|
|
2023-10-16 16:29:50,470 DEBUG [XNIO-67 task-1] ContextService: Exit: all() with result = [gcube, gcube/devsec, gcube/devsec/devVRE]
|
|
2023-10-16 16:29:50,470 DEBUG [XNIO-67 task-1] ContextResource: Exit: all() with result = [gcube, gcube/devsec, gcube/devsec/devVRE]
|
|
2023-10-16 16:29:50,471 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,383 DEBUG [XNIO-67 task-1] FilterChainProxy: Securing GET /
|
|
2023-10-16 16:30:07,383 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,384 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,384 DEBUG [XNIO-67 task-1] FilterSecurityInterceptor: Authorized public object filter invocation [GET /]
|
|
2023-10-16 16:30:07,384 DEBUG [XNIO-67 task-1] FilterChainProxy: Secured GET /
|
|
2023-10-16 16:30:07,392 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,420 DEBUG [XNIO-67 task-1] FilterChainProxy: Securing GET /content/css/loading.css
|
|
2023-10-16 16:30:07,420 DEBUG [XNIO-67 task-1] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,421 DEBUG [XNIO-67 task-2] FilterChainProxy: Securing GET /styles.css
|
|
2023-10-16 16:30:07,421 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,421 DEBUG [XNIO-67 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,422 DEBUG [XNIO-67 task-1] FilterSecurityInterceptor: Authorized filter invocation [GET /content/css/loading.css] with attributes [permitAll]
|
|
2023-10-16 16:30:07,422 DEBUG [XNIO-67 task-1] FilterChainProxy: Secured GET /content/css/loading.css
|
|
2023-10-16 16:30:07,422 DEBUG [XNIO-67 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,422 DEBUG [XNIO-67 task-2] FilterSecurityInterceptor: Authorized public object filter invocation [GET /styles.css]
|
|
2023-10-16 16:30:07,422 DEBUG [XNIO-67 task-2] FilterChainProxy: Secured GET /styles.css
|
|
2023-10-16 16:30:07,426 DEBUG [XNIO-67 task-1] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,427 DEBUG [XNIO-67 task-3] FilterChainProxy: Securing GET /runtime.js
|
|
2023-10-16 16:30:07,428 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /polyfills.js
|
|
2023-10-16 16:30:07,428 DEBUG [XNIO-67 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,429 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,429 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,429 DEBUG [XNIO-67 task-5] FilterChainProxy: Securing GET /main.js
|
|
2023-10-16 16:30:07,429 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,430 DEBUG [XNIO-67 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /runtime.js]
|
|
2023-10-16 16:30:07,430 DEBUG [XNIO-67 task-5] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,430 DEBUG [XNIO-67 task-3] FilterChainProxy: Secured GET /runtime.js
|
|
2023-10-16 16:30:07,431 DEBUG [XNIO-67 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,431 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /polyfills.js]
|
|
2023-10-16 16:30:07,431 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /polyfills.js
|
|
2023-10-16 16:30:07,431 DEBUG [XNIO-67 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,432 DEBUG [XNIO-67 task-5] FilterSecurityInterceptor: Authorized public object filter invocation [GET /main.js]
|
|
2023-10-16 16:30:07,432 DEBUG [XNIO-67 task-5] FilterChainProxy: Secured GET /main.js
|
|
2023-10-16 16:30:07,434 DEBUG [XNIO-67 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,434 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,439 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,450 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /content/images/logo-jhipster.png
|
|
2023-10-16 16:30:07,450 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,451 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,451 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /content/images/logo-jhipster.png] with attributes [permitAll]
|
|
2023-10-16 16:30:07,451 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /content/images/logo-jhipster.png
|
|
2023-10-16 16:30:07,453 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,500 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 16:30:07,500 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,500 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,500 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_bootstrap_ts.js]
|
|
2023-10-16 16:30:07,501 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /src_main_webapp_bootstrap_ts.js
|
|
2023-10-16 16:30:07,524 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,758 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 16:30:07,758 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,758 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,759 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7] with attributes [permitAll]
|
|
2023-10-16 16:30:07,759 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /i18n/en.json?_=e9fb688fdfe00f8e38c731928701e9a7
|
|
2023-10-16 16:30:07,761 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,764 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /api/account
|
|
2023-10-16 16:30:07,764 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,764 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,764 DEBUG [XNIO-67 task-3] FilterChainProxy: Securing GET /management/info
|
|
2023-10-16 16:30:07,765 DEBUG [XNIO-67 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,765 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /api/account] with attributes [permitAll]
|
|
2023-10-16 16:30:07,765 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /api/account
|
|
2023-10-16 16:30:07,765 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,765 DEBUG [XNIO-67 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /management/info] with attributes [permitAll]
|
|
2023-10-16 16:30:07,765 DEBUG [XNIO-67 task-3] FilterChainProxy: Secured GET /management/info
|
|
2023-10-16 16:30:07,765 DEBUG [XNIO-67 task-4] AccountResource: Enter: getAccount() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,767 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,768 DEBUG [XNIO-67 task-4] UserService: Enter: getUserFromAuthentication() with argument[s] = [OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,770 DEBUG [XNIO-67 task-4] UserService: AuthToken is a OAuth2AuthenticationToken
|
|
2023-10-16 16:30:07,770 DEBUG [XNIO-67 task-4] UserService: Attributes: {at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}
|
|
2023-10-16 16:30:07,772 DEBUG [XNIO-67 task-4] UserService: Exit: getUserFromAuthentication() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 16:30:07,773 DEBUG [XNIO-67 task-4] AccountResource: Exit: getAccount() with result = AdminUserDTO [id=4daf29c0-df41-447a-80b6-7e3eb665ea90, authorities=[ROLE_ADMIN], login=mariateresa.paratore, firstName=Maria Teresa, lastName=Paratore, email=mariateresa.paratore@isti.cnr.it, imageUrl=null, activated=true, langKey=en, realmAccessDTO=RealmAccessDTO(roles=[default-roles-d4science, offline_access, uma_authorization]), resourceAccessDTO=ResourceAccessDTO(resourceAccess={%2Fgcube=[Member], %2Fgcube%2Fdevsec=[Member], %2Fgcube%2FdevNext%2FNextNext=[Member], %2Fgcube%2Fdevsec%2FdevVRE=[Catalogue-Editor, Member], %2Fgcube%2FdevNext=[Member], account=[manage-account, manage-account-links, view-profile]})]
|
|
2023-10-16 16:30:07,777 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:07,815 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /logo-jhipster.png
|
|
2023-10-16 16:30:07,815 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,816 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:07,816 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /logo-jhipster.png]
|
|
2023-10-16 16:30:07,816 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /logo-jhipster.png
|
|
2023-10-16 16:30:07,818 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,247 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /src_main_webapp_app_admin_admin-routing_module_ts.js
|
|
2023-10-16 16:30:22,248 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,248 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,248 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_app_admin_admin-routing_module_ts.js]
|
|
2023-10-16 16:30:22,248 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /src_main_webapp_app_admin_admin-routing_module_ts.js
|
|
2023-10-16 16:30:22,250 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,258 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /src_main_webapp_app_admin_docs_docs_module_ts.js
|
|
2023-10-16 16:30:22,258 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,258 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,259 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized public object filter invocation [GET /src_main_webapp_app_admin_docs_docs_module_ts.js]
|
|
2023-10-16 16:30:22,259 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /src_main_webapp_app_admin_docs_docs_module_ts.js
|
|
2023-10-16 16:30:22,261 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,296 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /swagger-ui/index.html
|
|
2023-10-16 16:30:22,296 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,297 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,297 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/index.html] with attributes [permitAll]
|
|
2023-10-16 16:30:22,298 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /swagger-ui/index.html
|
|
2023-10-16 16:30:22,299 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,310 DEBUG [XNIO-67 task-4] FilterChainProxy: Securing GET /swagger-ui/swagger-ui.css
|
|
2023-10-16 16:30:22,310 DEBUG [XNIO-67 task-3] FilterChainProxy: Securing GET /swagger-ui/swagger-ui-bundle.js
|
|
2023-10-16 16:30:22,310 DEBUG [XNIO-67 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,310 DEBUG [XNIO-67 task-4] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,310 DEBUG [XNIO-67 task-5] FilterChainProxy: Securing GET /swagger-ui/swagger-ui-standalone-preset.js
|
|
2023-10-16 16:30:22,310 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,310 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-2] FilterChainProxy: Securing GET /swagger-ui/axios.min.js
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-4] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui.css] with attributes [permitAll]
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-5] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui-bundle.js] with attributes [permitAll]
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-4] FilterChainProxy: Secured GET /swagger-ui/swagger-ui.css
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-3] FilterChainProxy: Secured GET /swagger-ui/swagger-ui-bundle.js
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-5] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,311 DEBUG [XNIO-67 task-2] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,312 DEBUG [XNIO-67 task-5] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/swagger-ui-standalone-preset.js] with attributes [permitAll]
|
|
2023-10-16 16:30:22,312 DEBUG [XNIO-67 task-5] FilterChainProxy: Secured GET /swagger-ui/swagger-ui-standalone-preset.js
|
|
2023-10-16 16:30:22,312 DEBUG [XNIO-67 task-2] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,313 DEBUG [XNIO-67 task-2] FilterSecurityInterceptor: Authorized filter invocation [GET /swagger-ui/axios.min.js] with attributes [permitAll]
|
|
2023-10-16 16:30:22,313 DEBUG [XNIO-67 task-2] FilterChainProxy: Secured GET /swagger-ui/axios.min.js
|
|
2023-10-16 16:30:22,315 DEBUG [XNIO-67 task-4] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,316 DEBUG [XNIO-67 task-2] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,318 DEBUG [XNIO-67 task-5] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,319 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,459 DEBUG [XNIO-67 task-3] FilterChainProxy: Securing GET /management/jhiopenapigroups
|
|
2023-10-16 16:30:22,459 DEBUG [XNIO-67 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,459 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,460 DEBUG [XNIO-67 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /management/jhiopenapigroups] with attributes [hasAuthority('ROLE_ADMIN')]
|
|
2023-10-16 16:30:22,460 DEBUG [XNIO-67 task-3] FilterChainProxy: Secured GET /management/jhiopenapigroups
|
|
2023-10-16 16:30:22,461 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:22,480 DEBUG [XNIO-67 task-3] FilterChainProxy: Securing GET /v3/api-docs/springdocDefault
|
|
2023-10-16 16:30:22,481 DEBUG [XNIO-67 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,481 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:22,481 DEBUG [XNIO-67 task-3] FilterSecurityInterceptor: Authorized public object filter invocation [GET /v3/api-docs/springdocDefault]
|
|
2023-10-16 16:30:22,481 DEBUG [XNIO-67 task-3] FilterChainProxy: Secured GET /v3/api-docs/springdocDefault
|
|
2023-10-16 16:30:22,550 INFO [XNIO-67 task-3] AbstractOpenApiResource: Init duration for springdoc-openapi is: 67 ms
|
|
2023-10-16 16:30:22,554 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:30:49,952 DEBUG [XNIO-67 task-3] FilterChainProxy: Securing GET /api/is/allcontext
|
|
2023-10-16 16:30:49,952 DEBUG [XNIO-67 task-3] HttpSessionSecurityContextRepository: Retrieved SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:49,952 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Set SecurityContextHolder to SecurityContextImpl [Authentication=OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]]
|
|
2023-10-16 16:30:49,952 DEBUG [XNIO-67 task-3] FilterSecurityInterceptor: Authorized filter invocation [GET /api/is/allcontext] with attributes [authenticated]
|
|
2023-10-16 16:30:49,953 DEBUG [XNIO-67 task-3] FilterChainProxy: Secured GET /api/is/allcontext
|
|
2023-10-16 16:30:49,953 DEBUG [XNIO-67 task-3] InformationSystemResource: Enter: allcontext() with argument[s] = []
|
|
2023-10-16 16:30:49,954 DEBUG [XNIO-67 task-3] InformationSystemResource: Request uma token
|
|
2023-10-16 16:30:49,955 DEBUG [XNIO-67 task-3] TokenManager: OAuth2AuthenticationToken: OAuth2AuthenticationToken [Principal=Name: [4daf29c0-df41-447a-80b6-7e3eb665ea90], Granted Authorities: [[ROLE_USER, SCOPE_email, SCOPE_offline_access, SCOPE_openid, SCOPE_phone, SCOPE_profile]], User Attributes: [{at_hash=t6wdsZO66fwGDbYGVJLCcw, sub=4daf29c0-df41-447a-80b6-7e3eb665ea90, resource_access={"%2Fgcube":{"roles":["Member"]},"%2Fgcube%2Fdevsec":{"roles":["Member"]},"%2Fgcube%2FdevNext%2FNextNext":{"roles":["Member"]},"%2Fgcube%2Fdevsec%2FdevVRE":{"roles":["Catalogue-Editor","Member"]},"%2Fgcube%2FdevNext":{"roles":["Member"]},"account":{"roles":["manage-account","manage-account-links","view-profile"]}}, email_verified=true, iss=https://accounts.dev.d4science.org/auth/realms/d4science, typ=ID, preferred_username=mariateresa.paratore, given_name=Maria Teresa, nonce=75uYw5FtJBmJOnUKr7rQfElq54zrRAwfwxQgHtUgb2k, sid=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, aud=[pc-paratore.isti.cnr.it], realm_access={"roles":["default-roles-d4science","offline_access","uma_authorization"]}, azp=pc-paratore.isti.cnr.it, auth_time=2023-10-16T14:04:26Z, name=Maria Teresa Paratore, exp=2023-10-16T14:59:50Z, session_state=2b9d6128-7d9f-4c41-8984-fe01cd3723e3, family_name=Paratore, iat=2023-10-16T14:29:50Z, email=mariateresa.paratore@isti.cnr.it, jti=921e04b7-5f13-49b9-b07a-efdf454672b9}], Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=127.0.0.1, SessionId=LNS80M27zTx1OfRv8lwFU-hzYf_oO70kE-Lwz3Y-], Granted Authorities=[ROLE_ADMIN]]
|
|
2023-10-16 16:30:49,955 DEBUG [XNIO-67 task-3] TokenManager: AccessToken: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.V1U05Z7BPe9eP68kS7vkTtmwXqb3X18tuG7gp23rhEv5MbBTdLE7HneBf-RcLNZ9N0pCIRe2FgVbGAsc4i5lG8GhN60LBUsLxIJkBVTIsOT7LYyEDsuIEAOzWD9eQjHnBEA9pZAHUXzQJET3A26dVm-3Jxu-Cemx5uLahvhknc6ppjreQ587Fzn07MuCqiErIrF-TZBtfL4LOpw-OeQ0fJLb54FeKa1VpJf6HEU2w5E91uGOKyCzqyKoW5Ju86e9itaf_cMB50G0TWyjMojlkWtQubJzKPv9ex3phYfJRbG6miopEKDgluCBHYOp3Mp6UtbIWUn0cAKNyREwpgUsrg
|
|
2023-10-16 16:30:49,956 DEBUG [XNIO-67 task-3] TokenManager: Headers: [Content-Type:"application/x-www-form-urlencoded", Authorization:"Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.eyJleHAiOjE2OTc0NjgzOTAsImlhdCI6MTY5NzQ2NjU5MCwiYXV0aF90aW1lIjoxNjk3NDY1MDY2LCJqdGkiOiJlYzJlMWJlNC0zOTAyLTQzOGQtYTE1Yi1iMmE5MmMwOGI2ZjgiLCJpc3MiOiJodHRwczovL2FjY291bnRzLmRldi5kNHNjaWVuY2Uub3JnL2F1dGgvcmVhbG1zL2Q0c2NpZW5jZSIsImF1ZCI6WyIlMkZnY3ViZSIsIiUyRmdjdWJlJTJGZGV2c2VjIiwiJTJGZ2N1YmUlMkZkZXZOZXh0JTJGTmV4dE5leHQiLCIlMkZnY3ViZSUyRmRldnNlYyUyRmRldlZSRSIsIiUyRmdjdWJlJTJGZGV2TmV4dCIsImFjY291bnQiXSwic3ViIjoiNGRhZjI5YzAtZGY0MS00NDdhLTgwYjYtN2UzZWI2NjVlYTkwIiwidHlwIjoiQmVhcmVyIiwiYXpwIjoicGMtcGFyYXRvcmUuaXN0aS5jbnIuaXQiLCJub25jZSI6Ijc1dVl3NUZ0SkJtSk9uVUtyN3JRZkVscTU0enJSQXdmd3hRZ0h0VWdiMmsiLCJzZXNzaW9uX3N0YXRlIjoiMmI5ZDYxMjgtN2Q5Zi00YzQxLTg5ODQtZmUwMWNkMzcyM2UzIiwiYWxsb3dlZC1vcmlnaW5zIjpbIi8qIl0sInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJkZWZhdWx0LXJvbGVzLWQ0c2NpZW5jZSIsIm9mZmxpbmVfYWNjZXNzIiwidW1hX2F1dGhvcml6YXRpb24iXX0sInJlc291cmNlX2FjY2VzcyI6eyIlMkZnY3ViZSI6eyJyb2xlcyI6WyJNZW1iZXIiXX0sIiUyRmdjdWJlJTJGZGV2c2VjIjp7InJvbGVzIjpbIk1lbWJlciJdfSwiJTJGZ2N1YmUlMkZkZXZOZXh0JTJGTmV4dE5leHQiOnsicm9sZXMiOlsiTWVtYmVyIl19LCIlMkZnY3ViZSUyRmRldnNlYyUyRmRldlZSRSI6eyJyb2xlcyI6WyJDYXRhbG9ndWUtRWRpdG9yIiwiTWVtYmVyIl19LCIlMkZnY3ViZSUyRmRldk5leHQiOnsicm9sZXMiOlsiTWVtYmVyIl19LCJhY2NvdW50Ijp7InJvbGVzIjpbIm1hbmFnZS1hY2NvdW50IiwibWFuYWdlLWFjY291bnQtbGlua3MiLCJ2aWV3LXByb2ZpbGUiXX19LCJzY29wZSI6Im9wZW5pZCBwaG9uZSBlbWFpbCBvZmZsaW5lX2FjY2VzcyBwcm9maWxlIiwic2lkIjoiMmI5ZDYxMjgtN2Q5Zi00YzQxLTg5ODQtZmUwMWNkMzcyM2UzIiwiZW1haWxfdmVyaWZpZWQiOnRydWUsIm5hbWUiOiJNYXJpYSBUZXJlc2EgUGFyYXRvcmUiLCJwcmVmZXJyZWRfdXNlcm5hbWUiOiJtYXJpYXRlcmVzYS5wYXJhdG9yZSIsImdpdmVuX25hbWUiOiJNYXJpYSBUZXJlc2EiLCJmYW1pbHlfbmFtZSI6IlBhcmF0b3JlIiwiZW1haWwiOiJtYXJpYXRlcmVzYS5wYXJhdG9yZUBpc3RpLmNuci5pdCJ9.V1U05Z7BPe9eP68kS7vkTtmwXqb3X18tuG7gp23rhEv5MbBTdLE7HneBf-RcLNZ9N0pCIRe2FgVbGAsc4i5lG8GhN60LBUsLxIJkBVTIsOT7LYyEDsuIEAOzWD9eQjHnBEA9pZAHUXzQJET3A26dVm-3Jxu-Cemx5uLahvhknc6ppjreQ587Fzn07MuCqiErIrF-TZBtfL4LOpw-OeQ0fJLb54FeKa1VpJf6HEU2w5E91uGOKyCzqyKoW5Ju86e9itaf_cMB50G0TWyjMojlkWtQubJzKPv9ex3phYfJRbG6miopEKDgluCBHYOp3Mp6UtbIWUn0cAKNyREwpgUsrg"]
|
|
2023-10-16 16:30:49,957 DEBUG [XNIO-67 task-3] TokenManager: Params: {grant_type=[urn:ietf:params:oauth:grant-type:uma-ticket], audience=[%2Fgcube]}
|
|
2023-10-16 16:30:50,015 DEBUG [XNIO-67 task-3] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:30:50,016 DEBUG [XNIO-67 task-3] HttpURLConnection: sun.net.www.MessageHeader@43644008 pairs: {POST /auth/realms/d4science/protocol/openid-connect/token HTTP/1.1: null}{Accept: application/json, application/*+json}{Content-Type: application/x-www-form-urlencoded;charset=UTF-8}{Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.V1U05Z7BPe9eP68kS7vkTtmwXqb3X18tuG7gp23rhEv5MbBTdLE7HneBf-RcLNZ9N0pCIRe2FgVbGAsc4i5lG8GhN60LBUsLxIJkBVTIsOT7LYyEDsuIEAOzWD9eQjHnBEA9pZAHUXzQJET3A26dVm-3Jxu-Cemx5uLahvhknc6ppjreQ587Fzn07MuCqiErIrF-TZBtfL4LOpw-OeQ0fJLb54FeKa1VpJf6HEU2w5E91uGOKyCzqyKoW5Ju86e9itaf_cMB50G0TWyjMojlkWtQubJzKPv9ex3phYfJRbG6miopEKDgluCBHYOp3Mp6UtbIWUn0cAKNyREwpgUsrg}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}{Content-Length: 84}
|
|
2023-10-16 16:30:50,189 DEBUG [XNIO-67 task-3] HttpURLConnection: sun.net.www.MessageHeader@331249311 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-store}{x-content-type-options: nosniff}{set-cookie: KC_RESTART=; Version=1; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Max-Age=0; Path=/auth/realms/d4science/; Secure; HttpOnly}{pragma: no-cache}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 2512}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:30:50,190 DEBUG [XNIO-67 task-3] TokenManager: UmaResponceDTO: UmaResponseDTO(upgraded=false, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.Ne6ZUnMu6m2doqEW7JK3XBiDTqiqb5Bcw8X7s6aPG2ip117mgKKoBzPChjeYIRj9uQlERHkerUmq6DOeY8ajvWB4qeowJJhpzAk18EfXbcXIa6Gs2NrJJEvyFWHEyVm7ayzcKOc9GAmcHPZ6Fa2Osa-NbK3F3J2n88wkLTgu48j_5VJuKZ4tkT9kU-A4ctc0Yt-Mj5-PWDyzajh1wplm7DDfW5nDlkCMlHy2wWtynBXiOQ-6YIQbIzxuZf7-yeSWFTMkChtXkFNfjBQW-3Drm7FZYxbx6lvV4gvLeOFYqLqAMrKI1Pbx_sxaDtzTPlbBGPhVfzC8Y-5DgSsIwcPJcA, expires_in=1800, refresh_expires_in=1800, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJjOTk5YmVjNC1iNDc4LTQ4Y2YtYmI5OS0wMWMxODY5NzcwNGIifQ.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.aULk254tlWGNhWAQiCwm-QX5BkTIPsfWd4IfHVQw1xU, token_type=Bearer, not_before_policy=0)
|
|
2023-10-16 16:30:50,200 DEBUG [XNIO-67 task-3] TokenManager: UmaToken: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.Ne6ZUnMu6m2doqEW7JK3XBiDTqiqb5Bcw8X7s6aPG2ip117mgKKoBzPChjeYIRj9uQlERHkerUmq6DOeY8ajvWB4qeowJJhpzAk18EfXbcXIa6Gs2NrJJEvyFWHEyVm7ayzcKOc9GAmcHPZ6Fa2Osa-NbK3F3J2n88wkLTgu48j_5VJuKZ4tkT9kU-A4ctc0Yt-Mj5-PWDyzajh1wplm7DDfW5nDlkCMlHy2wWtynBXiOQ-6YIQbIzxuZf7-yeSWFTMkChtXkFNfjBQW-3Drm7FZYxbx6lvV4gvLeOFYqLqAMrKI1Pbx_sxaDtzTPlbBGPhVfzC8Y-5DgSsIwcPJcA
|
|
2023-10-16 16:30:50,201 DEBUG [XNIO-67 task-3] InformationSystemService: Enter: setUma() with argument[s] = [eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.Ne6ZUnMu6m2doqEW7JK3XBiDTqiqb5Bcw8X7s6aPG2ip117mgKKoBzPChjeYIRj9uQlERHkerUmq6DOeY8ajvWB4qeowJJhpzAk18EfXbcXIa6Gs2NrJJEvyFWHEyVm7ayzcKOc9GAmcHPZ6Fa2Osa-NbK3F3J2n88wkLTgu48j_5VJuKZ4tkT9kU-A4ctc0Yt-Mj5-PWDyzajh1wplm7DDfW5nDlkCMlHy2wWtynBXiOQ-6YIQbIzxuZf7-yeSWFTMkChtXkFNfjBQW-3Drm7FZYxbx6lvV4gvLeOFYqLqAMrKI1Pbx_sxaDtzTPlbBGPhVfzC8Y-5DgSsIwcPJcA]
|
|
2023-10-16 16:30:50,202 DEBUG [XNIO-67 task-3] InformationSystemService: Set Uma: [umaToken=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.Ne6ZUnMu6m2doqEW7JK3XBiDTqiqb5Bcw8X7s6aPG2ip117mgKKoBzPChjeYIRj9uQlERHkerUmq6DOeY8ajvWB4qeowJJhpzAk18EfXbcXIa6Gs2NrJJEvyFWHEyVm7ayzcKOc9GAmcHPZ6Fa2Osa-NbK3F3J2n88wkLTgu48j_5VJuKZ4tkT9kU-A4ctc0Yt-Mj5-PWDyzajh1wplm7DDfW5nDlkCMlHy2wWtynBXiOQ-6YIQbIzxuZf7-yeSWFTMkChtXkFNfjBQW-3Drm7FZYxbx6lvV4gvLeOFYqLqAMrKI1Pbx_sxaDtzTPlbBGPhVfzC8Y-5DgSsIwcPJcA]
|
|
2023-10-16 16:30:50,355 INFO [XNIO-67 task-3] ScopeProviderScanner: using scope provider org.gcube.common.scope.impl.DefaultScopeProvider@4beb1774
|
|
2023-10-16 16:30:50,356 DEBUG [XNIO-67 task-3] DefaultScopeProvider: setting scope /gcube in thread 1441
|
|
2023-10-16 16:30:50,356 DEBUG [XNIO-67 task-3] InformationSystemService: Exit: setUma() with result = null
|
|
2023-10-16 16:30:50,356 DEBUG [XNIO-67 task-3] InformationSystemService: Enter: getAllContext() with argument[s] = [/gcube]
|
|
2023-10-16 16:30:50,356 DEBUG [XNIO-67 task-3] InformationSystemService: GetAllContext: [context=/gcube]
|
|
2023-10-16 16:30:50,359 INFO [XNIO-67 task-3] ResourceRegistryClientImpl: Going to read all Contexts
|
|
2023-10-16 16:30:50,439 DEBUG [XNIO-67 task-3] security: ValidationChain: 1521974916, 544235253, -1533920910
|
|
2023-10-16 16:30:50,443 DEBUG [XNIO-67 task-3] security: TLSHandshake: url.gcube.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:30:50,444 DEBUG [XNIO-67 task-3] HttpURLConnection: sun.net.www.MessageHeader@3a7f59a86 pairs: {GET /resource-registry/access/contexts HTTP/1.1: null}{Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJSSklZNEpoNF9qdDdvNmREY0NlUDFfS1l0akcxVExXVW9oMkQ2Tzk1bFNBIn0.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.Ne6ZUnMu6m2doqEW7JK3XBiDTqiqb5Bcw8X7s6aPG2ip117mgKKoBzPChjeYIRj9uQlERHkerUmq6DOeY8ajvWB4qeowJJhpzAk18EfXbcXIa6Gs2NrJJEvyFWHEyVm7ayzcKOc9GAmcHPZ6Fa2Osa-NbK3F3J2n88wkLTgu48j_5VJuKZ4tkT9kU-A4ctc0Yt-Mj5-PWDyzajh1wplm7DDfW5nDlkCMlHy2wWtynBXiOQ-6YIQbIzxuZf7-yeSWFTMkChtXkFNfjBQW-3Drm7FZYxbx6lvV4gvLeOFYqLqAMrKI1Pbx_sxaDtzTPlbBGPhVfzC8Y-5DgSsIwcPJcA}{User-Agent: ResourceRegistryClientImpl}{Accept: application/json;charset=UTF-8}{Host: url.gcube.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:30:50,493 DEBUG [XNIO-67 task-3] HttpURLConnection: sun.net.www.MessageHeader@3de231387 pairs: {null: HTTP/1.1 200}{server: nginx}{date: Mon, 16 Oct 2023 14:30:50 GMT}{content-type: application/json;charset=UTF-8}{content-length: 2153}{vary: Accept-Encoding}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:30:50,495 DEBUG [XNIO-67 task-3] ResourceRegistryClientImpl: Got Contexts are [{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube","parent":null,"children":[{"type":"IsParentOf","id":"b4bdbd3e-87c4-43d1-b642-532f6a30ad44","target":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},{"type":"IsParentOf","id":"542179cb-36fc-4d4e-9771-b55d3b2bd301","target":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}}]},{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext","parent":{"type":"IsParentOf","id":"b4bdbd3e-87c4-43d1-b642-532f6a30ad44","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"01cc9e06-475b-43a4-a4cd-7f5070f0dc65","target":{"type":"Context","id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext"}}]},{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec","parent":{"type":"IsParentOf","id":"542179cb-36fc-4d4e-9771-b55d3b2bd301","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"e28b8e16-84d5-4cd9-a5a1-8a55fa371d0c","target":{"type":"Context","id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP"}},{"type":"IsParentOf","id":"e46696d5-3290-4d7a-b22a-71940bda7ec0","target":{"type":"Context","id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE"}}]},{"type":"Context","id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext","parent":{"type":"IsParentOf","id":"01cc9e06-475b-43a4-a4cd-7f5070f0dc65","source":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},"children":[]},{"type":"Context","id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP","parent":{"type":"IsParentOf","id":"e28b8e16-84d5-4cd9-a5a1-8a55fa371d0c","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]},{"type":"Context","id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE","parent":{"type":"IsParentOf","id":"e46696d5-3290-4d7a-b22a-71940bda7ec0","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]}]
|
|
2023-10-16 16:30:50,514 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.base.reference.properties.PropertyElement.
|
|
2023-10-16 16:30:50,517 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.queries.templates.reference.properties.TemplateVariable.
|
|
2023-10-16 16:30:50,518 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.properties.LinkedEntity.
|
|
2023-10-16 16:30:50,519 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.properties.PropertyDefinition.
|
|
2023-10-16 16:30:50,520 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Property.
|
|
2023-10-16 16:30:50,521 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Metadata.
|
|
2023-10-16 16:30:50,522 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.properties.PropertyType.
|
|
2023-10-16 16:30:50,524 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Encrypted.
|
|
2023-10-16 16:30:50,525 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.PropagationConstraint.
|
|
2023-10-16 16:30:50,527 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.base.reference.entities.EntityElement.
|
|
2023-10-16 16:30:50,527 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.entities.Entity.
|
|
2023-10-16 16:30:50,528 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.entities.Facet.
|
|
2023-10-16 16:30:50,530 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.entities.Resource.
|
|
2023-10-16 16:30:50,530 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.contexts.reference.entities.Context.
|
|
2023-10-16 16:30:50,531 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.entities.EntityType.
|
|
2023-10-16 16:30:50,532 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.entities.ResourceType.
|
|
2023-10-16 16:30:50,532 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.entities.FacetType.
|
|
2023-10-16 16:30:50,533 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.queries.templates.reference.entities.QueryTemplate.
|
|
2023-10-16 16:30:50,534 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.base.reference.relations.RelationElement.
|
|
2023-10-16 16:30:50,536 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.relations.RelationType.
|
|
2023-10-16 16:30:50,536 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.relations.IsRelatedToType.
|
|
2023-10-16 16:30:50,537 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.types.reference.relations.ConsistsOfType.
|
|
2023-10-16 16:30:50,539 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.contexts.reference.relations.IsParentOf.
|
|
2023-10-16 16:30:50,540 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.relations.Relation.
|
|
2023-10-16 16:30:50,540 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.relations.IsRelatedTo.
|
|
2023-10-16 16:30:50,540 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.relations.ConsistsOf.
|
|
2023-10-16 16:30:50,543 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Property.
|
|
2023-10-16 16:30:50,544 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Metadata.
|
|
2023-10-16 16:30:50,545 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Encrypted.
|
|
2023-10-16 16:30:50,545 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.PropagationConstraint.
|
|
2023-10-16 16:30:50,545 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.entities.Resource.
|
|
2023-10-16 16:30:50,546 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.entities.Facet.
|
|
2023-10-16 16:30:50,547 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.relations.IsRelatedTo.
|
|
2023-10-16 16:30:50,548 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.relations.ConsistsOf.
|
|
2023-10-16 16:30:50,549 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Property.
|
|
2023-10-16 16:30:50,549 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Metadata.
|
|
2023-10-16 16:30:50,549 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.Encrypted.
|
|
2023-10-16 16:30:50,549 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.properties.PropagationConstraint.
|
|
2023-10-16 16:30:50,550 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.entities.Resource.
|
|
2023-10-16 16:30:50,550 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.entities.Facet.
|
|
2023-10-16 16:30:50,551 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.relations.IsRelatedTo.
|
|
2023-10-16 16:30:50,552 INFO [XNIO-67 task-3] Discovery: + Added interface org.gcube.informationsystem.model.reference.relations.ConsistsOf.
|
|
2023-10-16 16:30:50,569 DEBUG [XNIO-67 task-3] InformationSystemService: AllContext: [{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube","parent":null,"children":[{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","target":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","target":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}}]}, {"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext","parent":{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","target":{"type":"Context","id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext"}}]}, {"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec","parent":{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","target":{"type":"Context","id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP"}},{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","target":{"type":"Context","id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE"}}]}, {"type":"Context","id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext","parent":{"type":"IsParentOf","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","source":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},"children":[]}, {"type":"Context","id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP","parent":{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]}, {"type":"Context","id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE","parent":{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]}]
|
|
2023-10-16 16:30:50,576 DEBUG [XNIO-67 task-3] InformationSystemService: Exit: getAllContext() with result = [{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube","parent":null,"children":[{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","target":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","target":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}}]}, {"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext","parent":{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","target":{"type":"Context","id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext"}}]}, {"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec","parent":{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","target":{"type":"Context","id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP"}},{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","target":{"type":"Context","id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE"}}]}, {"type":"Context","id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext","parent":{"type":"IsParentOf","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","source":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},"children":[]}, {"type":"Context","id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP","parent":{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]}, {"type":"Context","id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE","parent":{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]}]
|
|
2023-10-16 16:30:50,580 DEBUG [XNIO-67 task-3] InformationSystemResource: Exit: allcontext() with result = <200 OK OK,[{"id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube","parent":null,"children":[{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","target":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","target":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}}]},{"id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext","parent":{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","target":{"type":"Context","id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext"}}]},{"id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec","parent":{"type":"IsParentOf","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","source":{"type":"Context","id":"9a7752f6-ca01-4a89-a9dd-f36aeb2cbf50","name":"gcube"}},"children":[{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","target":{"type":"Context","id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP"}},{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","target":{"type":"Context","id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE"}}]},{"id":"c7f3af7e-7e8c-406e-8d5a-cd11c82b5fa3","name":"NextNext","parent":{"type":"IsParentOf","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","source":{"type":"Context","id":"4e6adfe6-ab93-47c0-a532-339bb92ad07a","name":"devNext"}},"children":[]},{"id":"a3e40b10-01d0-11ed-8d67-f3498769ebff","name":"CCP","parent":{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]},{"id":"8efe07f5-de24-49f9-a2fb-fbfdcfda8c91","name":"devVRE","parent":{"type":"IsParentOf","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","source":{"type":"Context","id":"2a9f4a4b-5f3e-4eee-9630-e2f7b2e58c34","name":"devsec"}},"children":[]}],[]>
|
|
2023-10-16 16:30:50,581 DEBUG [XNIO-67 task-3] SecurityContextPersistenceFilter: Cleared SecurityContextHolder to complete request
|
|
2023-10-16 16:32:28,797 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:32:28,798 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:32:28,798 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:32:29,235 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:32:29,235 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@33c086715 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:32:29,263 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@7ffb9d289 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:32:29,276 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:32:29,291 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:32:29,568 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:32:29,591 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:32:29,597 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:32:29,610 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:32:29,641 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:32:29,641 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:32:29,642 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:32:29,653 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@fca89f1, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@50116e2, org.springframework.security.web.context.SecurityContextPersistenceFilter@5c048f3d, org.springframework.security.web.header.HeaderWriterFilter@50ed4a29, org.springframework.web.filter.CorsFilter@5725ac31, org.springframework.security.web.csrf.CsrfFilter@5aedd5d5, org.springframework.security.web.authentication.logout.LogoutFilter@317ecea0, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@57b4fdba, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@5c4d75fc, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@6d7cf7b5, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@61f07d1, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@3c99b939, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@3254612b, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@7f63e28a, org.springframework.security.web.session.SessionManagementFilter@68f3ac8b, org.springframework.security.web.access.ExceptionTranslationFilter@7fd4b2ae, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@1086717e]
|
|
2023-10-16 16:32:29,662 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@662e1073
|
|
2023-10-16 16:32:29,662 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@18d1c0fd5 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:32:29,689 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@16c890a69 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:32:29,692 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4ae43b115 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:32:29,711 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5c5f07b69 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:32:29,859 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:32:29,859 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:32:30,022 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:32:30,035 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.287 seconds (JVM running for 4362.445)
|
|
2023-10-16 16:32:30,037 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|
|
2023-10-16 16:40:41,946 INFO [restartedMain] InformationsystemmonitorApp: Starting InformationsystemmonitorApp using Java 11.0.20 on MBP-di-maria.fritz.box with PID 7328 (/Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor/target/classes started by mariateresaparatore in /Users/mariateresaparatore/Documents/workspace-spring/informationsystemmonitor)
|
|
2023-10-16 16:40:41,948 DEBUG [restartedMain] InformationsystemmonitorApp: Running with Spring Boot v2.7.3, Spring v5.3.22
|
|
2023-10-16 16:40:41,948 INFO [restartedMain] InformationsystemmonitorApp: No active profile set, falling back to 2 default profiles: "dev", "api-docs"
|
|
2023-10-16 16:40:42,393 DEBUG [restartedMain] security: TLSHandshake: accounts.dev.d4science.org:443, TLSv1.3, TLS_AES_256_GCM_SHA384, -1533920910
|
|
2023-10-16 16:40:42,393 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@5f4948595 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:40:42,423 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@689dfcf29 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:40:42,437 DEBUG [restartedMain] WebConfigurer: Registering CORS filter
|
|
2023-10-16 16:40:42,452 INFO [restartedMain] WebConfigurer: Web application fully configured
|
|
2023-10-16 16:40:42,701 DEBUG [restartedMain] JwtGrantedAuthorityConverter: New JwtGrantedAuthorityConverter: created
|
|
2023-10-16 16:40:42,726 DEBUG [restartedMain] AsyncConfiguration: Creating Async Task Executor
|
|
2023-10-16 16:40:42,731 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi customizer
|
|
2023-10-16 16:40:42,744 DEBUG [restartedMain] AuthenticationConfiguration$DefaultPasswordEncoderAuthenticationManagerBuilder: No authenticationProviders and no parentAuthenticationManager defined. Returning null.
|
|
2023-10-16 16:40:42,775 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/**', OPTIONS]
|
|
2023-10-16 16:40:42,775 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/app/**/*.{js,html}']
|
|
2023-10-16 16:40:42,775 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/i18n/**']
|
|
2023-10-16 16:40:42,775 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/content/**']
|
|
2023-10-16 16:40:42,775 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/swagger-ui/**']
|
|
2023-10-16 16:40:42,775 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/test/**']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/login/oauth2/code/oidc']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/account']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/authenticate']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/api/auth-info']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/api/admin/**']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [authenticated] for Ant [pattern='/api/**']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/health/**']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/info']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [permitAll] for Ant [pattern='/management/prometheus']
|
|
2023-10-16 16:40:42,776 DEBUG [restartedMain] ExpressionBasedFilterInvocationSecurityMetadataSource: Adding web access control expression [hasAuthority('ROLE_ADMIN')] for Ant [pattern='/management/**']
|
|
2023-10-16 16:40:42,787 INFO [restartedMain] DefaultSecurityFilterChain: Will secure any request with [org.springframework.security.web.session.DisableEncodeUrlFilter@414536c0, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@544d99d, org.springframework.security.web.context.SecurityContextPersistenceFilter@44d4b68f, org.springframework.security.web.header.HeaderWriterFilter@431e2a6d, org.springframework.web.filter.CorsFilter@7401ecfc, org.springframework.security.web.csrf.CsrfFilter@186136bd, org.springframework.security.web.authentication.logout.LogoutFilter@34e44814, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@102abe99, org.springframework.security.oauth2.client.web.OAuth2AuthorizationRequestRedirectFilter@3f781c3d, org.springframework.security.oauth2.client.web.OAuth2LoginAuthenticationFilter@58138ac7, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@3fe19081, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@d1e9852, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@7a22a4fc, org.springframework.security.oauth2.client.web.OAuth2AuthorizationCodeGrantFilter@4de8eb4, org.springframework.security.web.session.SessionManagementFilter@5591b65e, org.springframework.security.web.access.ExceptionTranslationFilter@154dd064, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@6cdaf8ee]
|
|
2023-10-16 16:40:42,796 DEBUG [restartedMain] SecurityConfiguration: JWTDecoder: org.springframework.boot.web.client.RestTemplateBuilder@a7e2307
|
|
2023-10-16 16:40:42,796 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@4cbfb4675 pairs: {GET /auth/realms/d4science/.well-known/openid-configuration HTTP/1.1: null}{Accept: application/json, application/*+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:40:42,825 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@1d90f8249 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache, must-revalidate, no-transform, no-store}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 6329}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:40:42,828 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@149ba3d35 pairs: {GET /auth/realms/d4science/protocol/openid-connect/certs HTTP/1.1: null}{Accept: application/json, application/jwk-set+json}{User-Agent: Java/11.0.20}{Host: accounts.dev.d4science.org}{Connection: keep-alive}
|
|
2023-10-16 16:40:42,849 DEBUG [restartedMain] HttpURLConnection: sun.net.www.MessageHeader@6f06cc5c9 pairs: {null: HTTP/1.1 200 OK}{referrer-policy: no-referrer}{x-frame-options: ALLOW-FROM https://www.google.com}{cache-control: no-cache}{x-content-type-options: nosniff}{x-xss-protection: 1; mode=block}{content-type: application/json}{content-length: 1470}{strict-transport-security: max-age=63072000}
|
|
2023-10-16 16:40:43,018 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi default group
|
|
2023-10-16 16:40:43,019 DEBUG [restartedMain] JHipsterSpringDocGroupsConfiguration: Initializing JHipster OpenApi management group
|
|
2023-10-16 16:40:43,183 DEBUG [restartedMain] OAuth2RefreshTokensWebFilter: Filter 'OAuth2RefreshTokensWebFilter' configured for use
|
|
2023-10-16 16:40:43,195 INFO [restartedMain] InformationsystemmonitorApp: Started InformationsystemmonitorApp in 1.295 seconds (JVM running for 4855.61)
|
|
2023-10-16 16:40:43,198 INFO [restartedMain] InformationsystemmonitorApp:
|
|
----------------------------------------------------------
|
|
Application 'informationsystemmonitor' is running! Access URLs:
|
|
Local: http://localhost:8080/
|
|
External: http://192.168.178.34:8080/
|
|
Profile(s): [dev, api-docs]
|
|
----------------------------------------------------------
|