[GitHub] airavata issue #108: Identity Server Admin Services
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/108 @machristie and @scnakandala , I have implemented the discussed features, and also added resetPass and find user API's as requested by Supun. --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114192869 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114192120 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114191990 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114189806 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114189064 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114188916 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #109: Keycloak admin client for user migration - With ...
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/109 Keycloak admin client for user migration - With Resolved Conflicts same as : https://github.com/apache/airavata/pull/106 You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata is-user-migration Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/109.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #109 commit 8327c29f036ebcc93bc3f3616756c67bb36b7341 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-17T21:38:33Z boiler plate code for keycloak admin client commit ec35622d02a970a31dfe47c4b13312665143167d Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-23T20:32:54Z adding keycloak userstore migrator commit 161680df9675a92ae7e3fbfc616187801beb4f46 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-23T20:58:07Z adding pom file missed out in last commit commit 7d97f7340539968057196082395d14f5c616a24c Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-24T19:48:37Z removing installCert --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #106: Keycloak admin client for user migration
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/106 merge conflicts, closing this pull request. Will open a new one with resolved conflicts --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #106: Keycloak admin client for user migration
Github user anujbhan closed the pull request at: https://github.com/apache/airavata/pull/106 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114181749 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114181574 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/108#discussion_r114181208 --- Diff: airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java --- @@ -0,0 +1,254 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.service.profile.iam.admin.services.core.impl; + +import org.apache.airavata.common.exception.ApplicationSettingsException; +import org.apache.airavata.common.utils.ServerSettings; +import org.apache.airavata.model.credential.store.PasswordCredential; +import org.apache.airavata.model.user.UserProfile; +import org.apache.airavata.model.workspace.Gateway; +import org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface; +import org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException; +import org.keycloak.admin.client.Keycloak; +import org.keycloak.admin.client.resource.UserResource; +import org.keycloak.representations.idm.*; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; +import javax.ws.rs.core.Response; +import java.util.ArrayList; +import java.util.List; + +public class TenantManagementKeycloakImpl implements TenantManagementInterface { + +private final static Logger logger = LoggerFactory.getLogger(TenantManagementKeycloakImpl.class); + +private static Keycloak getClient(String adminUrl, String realm, PasswordCredential AdminPasswordCreds) { + +return Keycloak.getInstance( +adminUrl, +realm, // the realm to log in to +AdminPasswordCreds.getLoginUserName(), AdminPasswordCreds.getPassword(), // the user +"admin-cli"); // admin-cli is the client ID used for keycloak admin operations. +} + +@Override +public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, Gateway gatewayDetails) throws IamAdminServicesException { +try { +// get client +Keycloak client = TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), "master", isSuperAdminPasswordCreds); +// create realm +RealmRepresentation newRealmDetails = new RealmRepresentation(); +newRealmDetails.setEnabled(true); +newRealmDetails.setId(gatewayDetails.getGatewayId()); + newRealmDetails.setDisplayName(gatewayDetails.getGatewayName()); +newRealmDetails.setRealm(gatewayDetails.getGatewayId()); +RealmRepresentation realmWithRoles = TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails); +client.realms().create(realmWithRoles); +return gatewayDetails; +} catch (ApplicationSettingsException ex) { +logger.error("Error getting values from property file, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error getting Iam server Url from property file, reason: " + ex.getMessage()); +throw exception; +} catch (Exception ex){ +logger.error("Error creating Realm in Keycloak Server, reason: " + ex.getCause(), ex); +IamAdminServicesException exception = new IamAdminServicesException(); +exception.setMessage("Error creating Realm in Keycloak Server, reason: " + ex.getMessage()); +throw exception; +} +} + +public static RealmRepresentation createDefaultRoles(RealmRepresentation realmDetails){ +List defaultRoles = new ArrayList(); +RoleRepresentation adminRole = new RoleRepresentation()
[GitHub] airavata pull request #108: Identity Server Admin Services
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/108 Identity Server Admin Services Features: * Complete Gateway setup for Keycloak * User registration * Enabling user account Note: 2 Commits are repeated because of git rebase, just ignore them. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata is-admin-services Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/108.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #108 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #106: Keycloak admin client for user migration
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/106 I will merge this marcus, thank you ! On 4/25/17 3:11 PM, Marcus Christie wrote: > > @anujbhan <https://github.com/anujbhan> since you have write access to > the Apache repo, feel free to go ahead and merge this. Or I can merge > it if you would rather? Either way is fine with me. > > â > You are receiving this because you were mentioned. > Reply to this email directly, view it on GitHub > <https://github.com/apache/airavata/pull/106#issuecomment-297134683>, > or mute the thread > <https://github.com/notifications/unsubscribe-auth/AOOY4eY-NKuQzkRMMWtEfg_L-CwWz8MPks5rzkVOgaJpZM4NFiUT>. > --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #106: Keycloak admin client for user migration
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/106 @machristie I have removed the file --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #107: Ansible Playbook for Keycloak IS deployment
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/107 Ansible Playbook for Keycloak IS deployment Following features are supported: * Initial deployment of Keycloak Server (Standalone/HaCluster modes supported) * SSL certificate installation for Keycloak (Read dev-tools/ansible/roles/keycloak/README.md and dev-tools/ansible/roles/keycloak/files/README.md) for instructions. * To update SSL certificates run this playbook again on same host with new files. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata keycloak-deployment Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/107.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #107 commit 837e24958b750f85f3dce01ddde937a0bd450568 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-05T18:53:52Z adding ansible playbook for keycloak configuration commit 3a963d7364aa24d84f7c4a17acc13bfc54951c00 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-13T17:50:55Z adding support for standalone/hacluster/sslcerts & tested --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #106: Keycloak admin client for user migration
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/106 Keycloak admin client for user migration Adding Keycloak admin client for userStore migration. Now this module can handle two-way migrations, i.e from WSo2IS to AiravataUserProfileService and Keycloak Identity Server You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata keycloak-user-migration Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/106.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #106 commit fab92be5bb378dc7161b7ee4ab194efb64d3168f Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-17T21:38:33Z boiler plate code for keycloak admin client commit 9688c5c940fca764c5ec96320799c5697cd2fa73 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-23T20:32:54Z adding keycloak userstore migrator commit 2a72ed7e8b6aa6b82e732d858757e803a4ec996e Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-04-23T20:58:07Z adding pom file missed out in last commit --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #93: Adding SQL delta scripts for 0.16-0.17 release mi...
Github user anujbhan closed the pull request at: https://github.com/apache/airavata/pull/93 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #102: Update to DB migration scripts
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/102 Update to DB migration scripts There were some database schema changes since the creation of these scripts, hence updating them to reflect the changes You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata db-migrate-scripts Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/102.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #102 commit eb7cbc5c0786f4bd5a235c6a91d227b2b637ce47 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-26T19:22:56Z adding SQL delta scripts for 0.16-0.17 release migration commit 7cf48b3bb12b1ad1860b2396ea5fc15dd4d3a6c7 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-03-17T21:48:06Z updating the 0.16-0.17 delta scripts --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #96: User profile service
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/96 User profile service Adding user profile service to Airavata, this pull request includes both mine and @machristie changes You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata user-profile-service Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/96.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #96 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #94: Making corrections to user profile service code
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/94 Working on the review now ! --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #94: Making corrections to user profile service code
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/94 Making corrections to user profile service code Several changes in source code were needed to make this service working: 1. Added the user-profile service cpi thrift file to develop branch, it was missing 2. regenerated the thrift files to match other auto generated files (Add license, remove date through maven plugin) 3. made changes to all pom files related to user-profile service, made them consistant with other module pom files 4. changed the folder structure of user profile service to make it consistant with other modules 5. added correct class path for user-profile service in airavata-server.properties 6. Added dependency for user-profile service in distribution pom, to make the service discoverable when starting server 7. Made changes to thrift generation scripts to add user-profile thrift file 8. Removed unnecessary files 9. made changes to user profile server and handler files (Licence header etc) 10. Adding user profile service to serverMain.class (to start the server) All the changes have been tested on jet stream airavata deployment. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata userProfileService Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/94.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #94 commit 8f6f2183c42b1ce1432b93b4ade892f1f122fb2d Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-01-24T23:45:59Z making corrections to user profile service code commit aa98eee4f34949a4a8fe09361fe59d6e93e22e36 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-01-24T23:57:11Z adding the server property file, which was left out in last commit commit baaed53a372e7ab51eaed83b997dd604a29baf46 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-01-25T00:00:16Z adding dependancy for user-profile service in distribution pom commit c6ba43bf685b953f575760894fb89910e2c22d14 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2017-01-25T00:05:59Z adding user profile service to server module --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #88: User profile migration - adding dependency
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/88 User profile migration - adding dependency You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata userProfileMigration Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/88.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #88 commit ecf26dfcabafe519ffa0358413f388a6ac9eadb3 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-14T20:25:23Z update registry-refractoring code to user airavata-ser.properties commit 1ad40e3f5c4f38a66f14f9e6b4be8e05879441d3 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-15T18:01:24Z adding dependencies to registry-refractoring commit a65a2bd6caf8fafeae70d2f52aa8c9adbec8f3d8 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-15T18:05:40Z correcting compliation errors commit e65ebc13c576ffaabc14b7e404412e02fa138deb Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-15T18:08:23Z resolving dependencies --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #87: update registry-refractoring code to use airavata...
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/87 update registry-refractoring code to use airavata-server.properties You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata registry-refract-prop Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/87.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #87 commit a9187f2d29de3458f87d140f7a4b4d4f00401473 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-14T20:25:23Z update registry-refractoring code to user airavata-ser.properties --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #84: User profile migration module
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/84 https://issues.apache.org/jira/browse/AIRAVATA-2203 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #84: User profile migration module
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/84 User profile migration module _Contains_ * Workspace catalog registry module from Registry-refractoring branch * User-Profile Thrift service * User-Profile-migration module _Note_ * I did not find the new feature branch which was specifically created for putting this code, hence submitting to develop * No sensitive information is committed, hence the migration module will not work out-of-box, will need the server cert file and credentials to run. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata userProfileMigration Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/84.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #84 commit d9a69ae546736ce3265b6b5cedeeb6a2361293d8 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-12T20:00:27Z migrating user-profile service and new registry components to develop branch commit 49afd997f2f30ccabb83a30059f0e4483553a640 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-12T20:51:57Z adding the user-profile migration module to develop branch --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #76: Optimise cred store data models
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/76 making a new pull request with resolved conflicts --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #83: Credential store data model optimization
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/83 Credential store data model optimization https://issues.apache.org/jira/browse/AIRAVATA-2163 You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata cred-opt Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/83.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #83 commit 122fb8da06408b1f203006e88a97e923be4fbc2a Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-12T09:18:06Z migrating cred data models to airavata datamodel directory commit c1b696badd3ccfa686cdb21ab2da0012ec7dd354 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-12T16:58:57Z introducing summary type, dependencies and code clean up --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #76: Optimise cred store data models
Github user anujbhan closed the pull request at: https://github.com/apache/airavata/pull/76 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #81: Airavata 2245 Bug Resolution
Github user anujbhan commented on a diff in the pull request: https://github.com/apache/airavata/pull/81#discussion_r90576446 --- Diff: modules/registry/registry-core/src/main/java/org/apache/airavata/registry/core/app/catalog/model/UserResourceProfilePK.java --- @@ -0,0 +1,66 @@ +/* + * + * Licensed to the Apache Software Foundation (ASF) under one + * or more contributor license agreements. See the NOTICE file + * distributed with this work for additional information + * regarding copyright ownership. The ASF licenses this file + * to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance + * with the License. You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY + * KIND, either express or implied. See the License for the + * specific language governing permissions and limitations + * under the License. + * + */ + +package org.apache.airavata.registry.core.app.catalog.model; + +import java.io.Serializable; + +public class UserResourceProfilePK implements Serializable { + +private String userId; + +private String gatewayID; + +public UserResourceProfilePK(String userId, String gatewayID) { +this.userId = userId; +this.gatewayID = gatewayID; +} + +public UserResourceProfilePK() { +} + +@Override +public boolean equals(Object o) { --- End diff -- @machristie , yes you are right, Even I can't figure out why this is the case, all the composite Key classes in registry are implemented this way. @scnakandala , Can you give some insight ? --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #81: Airavata 2245 Bug Resolution
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/81 https://issues.apache.org/jira/browse/AIRAVATA-2245 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #81: Airavata 2245 Bug Resolution
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/81 Airavata 2245 Bug Resolution You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata develop Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/81.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #81 commit 98378b53e4e1da69e61f8149e51093eab94013a0 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-01T22:48:24Z adding composite primary key to model class commit f3c60d0b9f9e56cb29ffacb0e59b840303e54a08 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-01T22:49:32Z adding changes to resource class for newly added composite key commit 1bb80426d1acaa6d65aa49951fbb5fd1bc6a1703 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-12-01T22:51:14Z writing test case for Airavata-2245 bug resolution --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #74: AIRAVATA-2163: Optimising the cred store data model
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/74 https://github.com/apache/airavata/pull/76, refer this pull request with resolved conflicts --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #74: AIRAVATA-2163: Optimising the cred store data mod...
Github user anujbhan closed the pull request at: https://github.com/apache/airavata/pull/74 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #76: Optimise cred store data models
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/76 Optimise cred store data models This pull request resolves the merge conflicts in https://github.com/apache/airavata/pull/74 and also adds few incremental changes to credential-storestub pom file to remove date fields in auto-gen files You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata optimise-cred-pr-rc Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/76.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #76 commit ef2966ff8f2c7fb4ebb768ac4b72aadb193590a9 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-11-04T17:26:32Z AIRAVATA-2163: Optimising the cred store data model commit 8bdd26fc724a61d07b2a0cfe7123ccbd303a1f27 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-11-04T19:59:51Z correcting exception handling in Airavata API --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #74: AIRAVATA-2163: Optimising the cred store data model
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/74 @shamrath, Method signatures for fetching the Credential Summary data have been changed as a part of optimization, These changes should reflect in the PHP-Gateway implementation. I have informed Marcus about the same. --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #74: AIRAVATA-2163: Optimising the cred store data mod...
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/74 AIRAVATA-2163: Optimising the cred store data model This pull request resolves, https://issues.apache.org/jira/browse/AIRAVATA-2163 You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata optimise-cred-store Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/74.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #74 commit 6c5f6db6f6c235c5c3f78b35238328cb387ed385 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-11-04T17:26:32Z AIRAVATA-2163: Optimising the cred store data model --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #66: adding Airvata API method to initialize ssh keys ...
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/66 adding Airvata API method to initialize ssh keys with Desc, Airavata - 2158 You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata add-generateAndRegisterSSHKeysWithDesc-to-API Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/66.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #66 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #65: Resolving User storage preference bugs
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/65 Resolving User storage preference bugs ###Bug is resolved: https://issues.apache.org/jira/browse/AIRAVATA-2152?focusedCommentId=15595600=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-15595600 https://issues.apache.org/jira/browse/AIRAVATA-2152?focusedCommentId=15595650=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-15595650 You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata resolving-userStoragePreference-bug Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/65.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #65 commit 8422d23752dbf490c7c0a2f54fa13d6c2d617381 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-25T04:46:48Z Resolving User storage preference bugs --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #63: adding token to credential summary model
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/63 adding token to credential summary model The token field was missing, which apparently is an dependency when configuring the User Compute Preference. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata add-token-SSH-Summary Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/63.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #63 commit 48ea4a0f7be09235011960612c64756ef55e52b7 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-25T00:19:44Z adding token to credential summary model --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #59: uploading initial project structure
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/59 uploading initial project structure * Minimum bare bones implementation of thrift interface. * Next task would be to add the initial data-models You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata allocation-manager Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/59.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #59 commit fd42b790bcc403405127c1bb9785c6e1708a13b6 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-19T19:08:16Z uploading initial project structure --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #58: Initial Project Structure
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/58 I did a git rebase, but thought of pulling the develop branch changes as well, But now I realized, it is not needed. Doing a proper rebase. --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #56: User compute resource bug resolve
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/56 User compute resource bug resolve Bug 1 : getUserResourceProfile will return null if the profile is not found, rather than an exception Bug 2 : removeUserComputeResourcePreference is working now You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata user-compute-bug-resolve Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/56.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #56 commit dd319ce94ffb7db6729c724b0dbe3523bea0b338 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-14T19:38:42Z resolving bug 1: getUserResourceProfile will return null if not found in DB commit ff48f8c898b7160da6e646e55681bf6a92637549 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-14T20:04:26Z resolving bug 2 : removeUserComputeResourcePreference is working now commit e159a03165f38287551f708f44a832db7f9af630 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-14T20:04:54Z Merge remote-tracking branch 'upstream/develop' into user-compute-bug-resolve --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #54: Adding SSH Credential summary data model
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/54 @shamrath, Here is the follow up JIRA : https://issues.apache.org/jira/browse/AIRAVATA-2163, and I have moved the credential store thrift file to data-models directory, though the actual data models will be created in credential-store modules directory. --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #54: Adding SSH Credential summary data model
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/54 @smarru & @shamrath, Optimization to this PR may take some time. Since this PR is critical, Please consider merging. I will submit the changes as soon as possible with another pull request. The build is passing in my local environment, don't know why Travis is failing. --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #54: Adding SSH Credential summary data model
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/54 All the festures requested are there in this PR. But i am working on the additional changes prescribed by shameera On Oct 12, 2016 2:16 PM, "Suresh Marru" <notificati...@github.com> wrote: Can we review and merge this now? I mean are you done working on this PR? > On Oct 12, 2016, at 1:19 PM, Anuj Bhandar <notificati...@github.com> wrote: > > @smarru <https://github.com/smarru>, > Method to fetch specific user's public keys with summary is added > > â > You are receiving this because you were mentioned. > Reply to this email directly, view it on GitHub < https://github.com/apache/airavata/pull/54#issuecomment-253278638>, or mute the thread <https://github.com/notifications/unsubscribe- auth/ACbXSjo-r85VddHayUhJa-y_SYvfh7oPks5qzRa4gaJpZM4KTEWl>. > â You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub <https://github.com/apache/airavata/pull/54#issuecomment-253294073>, or mute the thread <https://github.com/notifications/unsubscribe-auth/AOOY4bhzay3sRrxXSSXKQWcEbqqkG-u8ks5qzSQHgaJpZM4KTEWl> . --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #54: Adding SSH Credential summary data model
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/54 @smarru, Method to fetch specific user's public keys with summary is added --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #54: Adding SSH Credential summary data model
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/54 @shamrath, Indeed a good list of improvements, this way the Airavata Api will remain clutter free. I will start the development on these shortly. --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...
Github user anujbhan closed the pull request at: https://github.com/apache/airavata/pull/50 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...
GitHub user anujbhan reopened a pull request: https://github.com/apache/airavata/pull/50 Feature request : User compute resource preference **Note: This pull request is not ready for merging** This feature adds the capability for user to define a user specific compute preference (Ex: An IU Big Red II account) for job scheduling. 1. Created new Data model for User resource profile (Similar to GatewayResourceProfile but omitting unnecessary fields). 2. Changes to Airavata Api thrift model, defined end points to consume the created Data model 3. Changes to registry module to add new DB tables and handlers - Some changes need to be discussed with the team, like handling the user-profile data model from registry - Primary keys in User_Resource_Profile table and their respective handlers - Some changes are pending, like validating the USER_ID field in User_Resource_Profile, since this change involves creating user table in registry, it needs to be discussed with the team. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata userComputeResource Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/50.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #50 commit 81c6ea841e265dc8f7f159e4bbe0d1457db2b213 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-03T00:57:28Z Feature request: User Compute Preference commit 8469effce22ffe3a54255d3920ee33b9d9035c06 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-07T15:48:58Z correcting the registry code, testing not yet complete --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #50: Feature request : User compute resource preference
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/50 Closing this pull request due to merge conflicts, will create a new branch with updated code --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...
Github user anujbhan closed the pull request at: https://github.com/apache/airavata/pull/50 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata issue #49: Feature request : User compute resource preference
Github user anujbhan commented on the issue: https://github.com/apache/airavata/pull/49 **this pull request was made by mistake, ignore** --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/50 Feature request : User compute resource preference **Note: This pull request is not ready for merging** This feature adds the capability for user to define a user specific compute preference (Ex: An IU Big Red II account) for job scheduling. 1. Created new Data model for User resource profile (Similar to GatewayResourceProfile but omitting unnecessary fields). 2. Changes to Airavata Api thrift model, defined end points to consume the created Data model 3. Changes to registry module to add new DB tables and handlers - Some changes need to be discussed with the team, like handling the user-profile data model from registry - Primary keys in User_Resource_Profile table and their respective handlers - Some changes are pending, like validating the USER_ID field in User_Resource_Profile, since this change involves creating user table in registry, it needs to be discussed with the team. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata userComputeResource Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/50.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #50 commit 81c6ea841e265dc8f7f159e4bbe0d1457db2b213 Author: Anuj Bhandar <bhandar.a...@gmail.com> Date: 2016-10-03T00:57:28Z Feature request: User Compute Preference --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #49: Feature request : User compute resource preferenc...
Github user anujbhan closed the pull request at: https://github.com/apache/airavata/pull/49 --- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. ---
[GitHub] airavata pull request #49: Feature request : User compute resource preferenc...
GitHub user anujbhan opened a pull request: https://github.com/apache/airavata/pull/49 Feature request : User compute resource preference **Note: This pull request is not ready for merging** This feature adds the capability for user to define a user specific compute preference (Ex: An IU Big Red II account) for job scheduling. 1. Created new Data model for User resource profile (Similar to GatewayResourceProfile but omitting unnecessary fields). 2. Changes to Airavata Api thrift model, defined end points to consume the created Data model 3. Changes to registry module to add new DB tables and handlers - Some changes need to be discussed with the team, like handling the user-profile data model from registry - Primary keys in User_Resource_Profile table and their respective handlers - Some changes are pending, like validating the USER_ID field in User_Resource_Profile, since this change involves creating user table in registry, it needs to be discussed with the team. You can merge this pull request into a Git repository by running: $ git pull https://github.com/anujbhan/airavata userComputeResource Alternatively you can review and apply these changes as the patch at: https://github.com/apache/airavata/pull/49.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #49 commit 24ced80054f084a78d86fff36672c834e144d3e9 Author: Jeff Kinnison <jeffdkinni...@gmail.com> Date: 2016-06-10T20:46:02Z add simstream module to airavata commit 70f85795304e8ce719ffac50d41b5b31cf9fc800 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-07T15:42:47Z creating new branch for grouper integration commit 89e0fdc80740223c44e676a5de4ac36d6cddebcb Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-07T15:43:40Z adding more files commit c3ea76ed8ee74e1bf3059ddee0fbcb9185c29290 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-07T16:55:23Z bug fix in search experiments and projects commit 5d1f9e706848639301e7f9cbac95ed88c7435a58 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-07T19:46:55Z fixing resource not found exception commit 59449b28eae9ab112386e2d30b3b18891870d34c Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-07T20:23:49Z fixing id not set issue commit 2c1dc547567f6028ba81d290e6977749536283c9 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-07T20:33:13Z fixing id not set issue commit 9f57e42204938ac32ffbdf9aa5153118a1441eaf Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-07T20:48:17Z fixing id not set issue commit 639813231a297be0ac50a94050a9ae6341c7de3d Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-08T04:02:54Z adding grouper config files to the bin directory commit 35466d476e2db5b50286e934c556bcf3bcbb6929 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-08T22:55:39Z fixing emptyIds bug commit 52dc070d7acc3d0d5cb8d80416884bacb5f0d04d Author: Vivek Sachdeva <vsachd...@cj.com> Date: 2016-07-10T20:55:22Z Add method to get user memberships. Allow the owner of the group to make updates commit 6148dabfbb3e4d1c794988b23018596b06a3e361 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-11T16:38:21Z fixing get all users error commit 7c6a11d3ab871c2687d08695fbf1421ad5fcabde Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-11T19:38:40Z fixing throw exception issue commit 171ee0c26354f1cea131a2bbed81557283090da1 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-11T22:48:46Z WIP commit eaf20ccf26819132d17aed02aed8601383298d54 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-12T15:49:42Z adding Group Management related API methods commit 2e7ecb3f95d0cd33635b11493bbf64d54e99d71e Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-12T16:01:09Z adding missing files commit d12f590e807c84310e879b9c3241a748ba7a553f Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-12T23:24:57Z fixing getAllAccessibleUsers issue commit 5f9dacea192c250ab18551423974b43f394c3659 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-12T23:25:48Z removing main method added for testing commit 620d9fb6aecadff92c95aa27a28517d62d5a7684 Author: scnakandala <supun.nakand...@gmail.com> Date: 2016-07-13T05:31:48Z Merge branch 'develop' of https://git-wip-us.apache.org/repos/asf/airavata into grouper-integration # Conflicts: # airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/handler/AiravataServerHandler.java # airavata-api/airavata-api-stubs/src/main/java/org/apache/aira