[GitHub] airavata issue #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/108
  
@machristie  and @scnakandala ,
I have implemented the discussed features, and also added resetPass and 
find user API's as requested by Supun.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114192869
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114192120
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114191990
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114189806
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114189064
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114188916
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #109: Keycloak admin client for user migration - With ...

2017-05-01 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/109

Keycloak admin client for user migration - With Resolved Conflicts

same as : https://github.com/apache/airavata/pull/106

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata is-user-migration

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/109.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #109


commit 8327c29f036ebcc93bc3f3616756c67bb36b7341
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-17T21:38:33Z

boiler plate code for keycloak admin client

commit ec35622d02a970a31dfe47c4b13312665143167d
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-23T20:32:54Z

adding keycloak userstore migrator

commit 161680df9675a92ae7e3fbfc616187801beb4f46
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-23T20:58:07Z

adding pom file missed out in last commit

commit 7d97f7340539968057196082395d14f5c616a24c
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-24T19:48:37Z

removing installCert




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #106: Keycloak admin client for user migration

2017-05-01 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/106
  
merge conflicts, closing this pull request. Will open a new one with 
resolved conflicts


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---



[GitHub] airavata pull request #106: Keycloak admin client for user migration

2017-05-01 Thread anujbhan
Github user anujbhan closed the pull request at:

https://github.com/apache/airavata/pull/106


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114181749
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114181574
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-05-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/108#discussion_r114181208
  
--- Diff: 
airavata-services/profile-service/iam-admin-services-core/src/main/java/org/apache/airavata/service/profile/iam/admin/services/core/impl/TenantManagementKeycloakImpl.java
 ---
@@ -0,0 +1,254 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.service.profile.iam.admin.services.core.impl;
+
+import org.apache.airavata.common.exception.ApplicationSettingsException;
+import org.apache.airavata.common.utils.ServerSettings;
+import org.apache.airavata.model.credential.store.PasswordCredential;
+import org.apache.airavata.model.user.UserProfile;
+import org.apache.airavata.model.workspace.Gateway;
+import 
org.apache.airavata.service.profile.iam.admin.services.core.interfaces.TenantManagementInterface;
+import 
org.apache.airavata.service.profile.iam.admin.services.cpi.exception.IamAdminServicesException;
+import org.keycloak.admin.client.Keycloak;
+import org.keycloak.admin.client.resource.UserResource;
+import org.keycloak.representations.idm.*;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+import javax.ws.rs.core.Response;
+import java.util.ArrayList;
+import java.util.List;
+
+public class TenantManagementKeycloakImpl implements 
TenantManagementInterface {
+
+private final static Logger logger = 
LoggerFactory.getLogger(TenantManagementKeycloakImpl.class);
+
+private static Keycloak getClient(String adminUrl, String realm, 
PasswordCredential AdminPasswordCreds) {
+
+return Keycloak.getInstance(
+adminUrl,
+realm, // the realm to log in to
+AdminPasswordCreds.getLoginUserName(), 
AdminPasswordCreds.getPassword(),  // the user
+"admin-cli"); // admin-cli is the client ID used for 
keycloak admin operations.
+}
+
+@Override
+public Gateway addTenant(PasswordCredential isSuperAdminPasswordCreds, 
Gateway gatewayDetails) throws IamAdminServicesException {
+try {
+// get client
+Keycloak client = 
TenantManagementKeycloakImpl.getClient(ServerSettings.getIamServerUrl(), 
"master", isSuperAdminPasswordCreds);
+// create realm
+RealmRepresentation newRealmDetails = new 
RealmRepresentation();
+newRealmDetails.setEnabled(true);
+newRealmDetails.setId(gatewayDetails.getGatewayId());
+
newRealmDetails.setDisplayName(gatewayDetails.getGatewayName());
+newRealmDetails.setRealm(gatewayDetails.getGatewayId());
+RealmRepresentation realmWithRoles = 
TenantManagementKeycloakImpl.createDefaultRoles(newRealmDetails);
+client.realms().create(realmWithRoles);
+return gatewayDetails;
+} catch (ApplicationSettingsException ex) {
+logger.error("Error getting values from property file, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error getting Iam server Url from 
property file, reason: " + ex.getMessage());
+throw exception;
+} catch (Exception ex){
+logger.error("Error creating Realm in Keycloak Server, reason: 
" + ex.getCause(), ex);
+IamAdminServicesException exception = new 
IamAdminServicesException();
+exception.setMessage("Error creating Realm in Keycloak Server, 
reason: " + ex.getMessage());
+throw exception;
+}
+}
+
+public static RealmRepresentation 
createDefaultRoles(RealmRepresentation realmDetails){
+List defaultRoles = new 
ArrayList();
+RoleRepresentation adminRole = new RoleRepresentation()

[GitHub] airavata pull request #108: Identity Server Admin Services

2017-04-27 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/108

Identity Server Admin Services

Features:
* Complete Gateway setup for Keycloak
* User registration
* Enabling user account

Note: 2 Commits are repeated because of git rebase, just ignore them.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata is-admin-services

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/108.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #108






---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #106: Keycloak admin client for user migration

2017-04-25 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/106
  
I will merge this marcus, thank you !


On 4/25/17 3:11 PM, Marcus Christie wrote:
>
> @anujbhan <https://github.com/anujbhan> since you have write access to 
> the Apache repo, feel free to go ahead and merge this. Or I can merge 
> it if you would rather? Either way is fine with me.
>
> —
> You are receiving this because you were mentioned.
> Reply to this email directly, view it on GitHub 
> <https://github.com/apache/airavata/pull/106#issuecomment-297134683>, 
> or mute the thread 
> 
<https://github.com/notifications/unsubscribe-auth/AOOY4eY-NKuQzkRMMWtEfg_L-CwWz8MPks5rzkVOgaJpZM4NFiUT>.
>




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #106: Keycloak admin client for user migration

2017-04-24 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/106
  
@machristie 
I have removed the file


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #107: Ansible Playbook for Keycloak IS deployment

2017-04-23 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/107

Ansible Playbook for Keycloak IS deployment

Following features are supported: 
* Initial deployment of Keycloak Server (Standalone/HaCluster modes 
supported)
* SSL certificate installation for Keycloak (Read 
dev-tools/ansible/roles/keycloak/README.md and  
dev-tools/ansible/roles/keycloak/files/README.md) for instructions.
* To update SSL certificates run this playbook again on same host with new 
files.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata keycloak-deployment

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/107.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #107


commit 837e24958b750f85f3dce01ddde937a0bd450568
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-05T18:53:52Z

adding ansible playbook for keycloak configuration

commit 3a963d7364aa24d84f7c4a17acc13bfc54951c00
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-13T17:50:55Z

adding support for standalone/hacluster/sslcerts & tested




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #106: Keycloak admin client for user migration

2017-04-23 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/106

Keycloak admin client for user migration

Adding Keycloak admin client for userStore migration. Now this module can 
handle two-way migrations, i.e from WSo2IS to AiravataUserProfileService and 
Keycloak Identity Server

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata keycloak-user-migration

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/106.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #106


commit fab92be5bb378dc7161b7ee4ab194efb64d3168f
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-17T21:38:33Z

boiler plate code for keycloak admin client

commit 9688c5c940fca764c5ec96320799c5697cd2fa73
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-23T20:32:54Z

adding keycloak userstore migrator

commit 2a72ed7e8b6aa6b82e732d858757e803a4ec996e
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-04-23T20:58:07Z

adding pom file missed out in last commit




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #93: Adding SQL delta scripts for 0.16-0.17 release mi...

2017-04-04 Thread anujbhan
Github user anujbhan closed the pull request at:

https://github.com/apache/airavata/pull/93


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #102: Update to DB migration scripts

2017-03-17 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/102

Update to DB migration scripts

There were some database schema changes since the creation of these 
scripts, hence updating them to reflect the changes

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata db-migrate-scripts

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/102.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #102


commit eb7cbc5c0786f4bd5a235c6a91d227b2b637ce47
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-26T19:22:56Z

adding SQL delta scripts for 0.16-0.17 release migration

commit 7cf48b3bb12b1ad1860b2396ea5fc15dd4d3a6c7
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-03-17T21:48:06Z

updating the 0.16-0.17 delta scripts




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #96: User profile service

2017-02-28 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/96

User profile service

Adding user profile service to Airavata, this pull request includes both 
mine and @machristie changes

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata user-profile-service

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/96.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #96






---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #94: Making corrections to user profile service code

2017-01-25 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/94
  
Working on the review now !


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #94: Making corrections to user profile service code

2017-01-24 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/94

Making corrections to user profile service code

Several changes in source code were needed to make this service working:

1. Added the user-profile service cpi thrift file to develop branch, it was 
missing
2. regenerated the thrift files to match other auto generated files (Add 
license, remove date through maven plugin)
3. made changes to all pom files related to user-profile service, made them 
consistant with other module pom files
4. changed the folder structure of user profile service to make it 
consistant with other modules
5. added correct class path for user-profile service in 
airavata-server.properties
6. Added dependency for user-profile service in distribution pom, to make 
the service discoverable when starting server
7. Made changes to thrift generation scripts to add user-profile thrift file
8. Removed unnecessary files
9. made changes to user profile server and handler files (Licence header 
etc)
10. Adding user profile service to serverMain.class (to start the server)

All the changes have been tested on jet stream airavata deployment.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata userProfileService

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/94.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #94


commit 8f6f2183c42b1ce1432b93b4ade892f1f122fb2d
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-01-24T23:45:59Z

making corrections to user profile service code

commit aa98eee4f34949a4a8fe09361fe59d6e93e22e36
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-01-24T23:57:11Z

adding the server property file, which was left out in last commit

commit baaed53a372e7ab51eaed83b997dd604a29baf46
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-01-25T00:00:16Z

adding dependancy for user-profile service in distribution pom

commit c6ba43bf685b953f575760894fb89910e2c22d14
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2017-01-25T00:05:59Z

adding user profile service to server module




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #88: User profile migration - adding dependency

2016-12-15 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/88

User profile migration - adding dependency



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata userProfileMigration

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/88.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #88


commit ecf26dfcabafe519ffa0358413f388a6ac9eadb3
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-14T20:25:23Z

update registry-refractoring code to user airavata-ser.properties

commit 1ad40e3f5c4f38a66f14f9e6b4be8e05879441d3
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-15T18:01:24Z

adding dependencies to registry-refractoring

commit a65a2bd6caf8fafeae70d2f52aa8c9adbec8f3d8
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-15T18:05:40Z

correcting compliation errors

commit e65ebc13c576ffaabc14b7e404412e02fa138deb
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-15T18:08:23Z

resolving dependencies




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #87: update registry-refractoring code to use airavata...

2016-12-14 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/87

update registry-refractoring code to use airavata-server.properties



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata registry-refract-prop

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/87.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #87


commit a9187f2d29de3458f87d140f7a4b4d4f00401473
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-14T20:25:23Z

update registry-refractoring code to user airavata-ser.properties




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #84: User profile migration module

2016-12-12 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/84
  
https://issues.apache.org/jira/browse/AIRAVATA-2203



---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #84: User profile migration module

2016-12-12 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/84

User profile migration module

_Contains_
 *  Workspace catalog registry module from Registry-refractoring branch
 *  User-Profile Thrift service
 *  User-Profile-migration module

_Note_
 *  I did not find the new feature branch which was specifically created 
for putting this code, hence submitting to develop
 *  No sensitive information is committed, hence the migration module will 
not work out-of-box, will need the server cert file and credentials to run.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata userProfileMigration

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/84.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #84


commit d9a69ae546736ce3265b6b5cedeeb6a2361293d8
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-12T20:00:27Z

migrating user-profile service and new registry components to develop branch

commit 49afd997f2f30ccabb83a30059f0e4483553a640
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-12T20:51:57Z

adding the user-profile migration module to develop branch




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #76: Optimise cred store data models

2016-12-12 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/76
  
making a new pull request with resolved conflicts


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #83: Credential store data model optimization

2016-12-12 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/83

Credential store data model optimization

https://issues.apache.org/jira/browse/AIRAVATA-2163

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata cred-opt

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/83.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #83


commit 122fb8da06408b1f203006e88a97e923be4fbc2a
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-12T09:18:06Z

migrating cred data models to airavata datamodel directory

commit c1b696badd3ccfa686cdb21ab2da0012ec7dd354
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-12T16:58:57Z

introducing summary type, dependencies and code clean up




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #76: Optimise cred store data models

2016-12-12 Thread anujbhan
Github user anujbhan closed the pull request at:

https://github.com/apache/airavata/pull/76


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #81: Airavata 2245 Bug Resolution

2016-12-01 Thread anujbhan
Github user anujbhan commented on a diff in the pull request:

https://github.com/apache/airavata/pull/81#discussion_r90576446
  
--- Diff: 
modules/registry/registry-core/src/main/java/org/apache/airavata/registry/core/app/catalog/model/UserResourceProfilePK.java
 ---
@@ -0,0 +1,66 @@
+/*
+ *
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ *
+ */
+
+package org.apache.airavata.registry.core.app.catalog.model;
+
+import java.io.Serializable;
+
+public class UserResourceProfilePK implements Serializable {
+
+private String userId;
+
+private String gatewayID;
+
+public UserResourceProfilePK(String userId, String gatewayID) {
+this.userId = userId;
+this.gatewayID = gatewayID;
+}
+
+public UserResourceProfilePK() {
+}
+
+@Override
+public boolean equals(Object o) {
--- End diff --

@machristie ,
yes you are right, Even I can't figure out why this is the case, all the 
composite Key classes in registry are implemented this way. 

@scnakandala ,
Can you give some insight ? 


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #81: Airavata 2245 Bug Resolution

2016-12-01 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/81
  
https://issues.apache.org/jira/browse/AIRAVATA-2245


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #81: Airavata 2245 Bug Resolution

2016-12-01 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/81

Airavata 2245 Bug Resolution



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata develop

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/81.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #81


commit 98378b53e4e1da69e61f8149e51093eab94013a0
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-01T22:48:24Z

adding composite primary key to model class

commit f3c60d0b9f9e56cb29ffacb0e59b840303e54a08
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-01T22:49:32Z

adding changes to resource class for newly added composite key

commit 1bb80426d1acaa6d65aa49951fbb5fd1bc6a1703
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-12-01T22:51:14Z

writing test case for Airavata-2245 bug resolution




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #74: AIRAVATA-2163: Optimising the cred store data model

2016-11-11 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/74
  
https://github.com/apache/airavata/pull/76, refer this pull request with 
resolved conflicts


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #74: AIRAVATA-2163: Optimising the cred store data mod...

2016-11-11 Thread anujbhan
Github user anujbhan closed the pull request at:

https://github.com/apache/airavata/pull/74


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #76: Optimise cred store data models

2016-11-11 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/76

Optimise cred store data models

This pull request resolves the merge conflicts in 
https://github.com/apache/airavata/pull/74 and also adds few incremental 
changes to credential-storestub pom file to remove date fields in auto-gen files

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata optimise-cred-pr-rc

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/76.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #76


commit ef2966ff8f2c7fb4ebb768ac4b72aadb193590a9
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-11-04T17:26:32Z

AIRAVATA-2163: Optimising the cred store data model

commit 8bdd26fc724a61d07b2a0cfe7123ccbd303a1f27
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-11-04T19:59:51Z

correcting exception handling in Airavata API




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #74: AIRAVATA-2163: Optimising the cred store data model

2016-11-04 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/74
  
@shamrath,
Method signatures for fetching the Credential Summary data have been 
changed as a part of optimization, These changes should reflect in the 
PHP-Gateway implementation. I have informed Marcus about the same.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #74: AIRAVATA-2163: Optimising the cred store data mod...

2016-11-04 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/74

AIRAVATA-2163: Optimising the cred store data model

This pull request resolves, 
https://issues.apache.org/jira/browse/AIRAVATA-2163

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata optimise-cred-store

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/74.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #74


commit 6c5f6db6f6c235c5c3f78b35238328cb387ed385
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-11-04T17:26:32Z

AIRAVATA-2163: Optimising the cred store data model




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #66: adding Airvata API method to initialize ssh keys ...

2016-10-26 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/66

adding Airvata API method to initialize ssh keys with Desc, Airavata - 2158



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata 
add-generateAndRegisterSSHKeysWithDesc-to-API

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/66.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #66






---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #65: Resolving User storage preference bugs

2016-10-24 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/65

Resolving User storage preference bugs

###Bug is resolved:


https://issues.apache.org/jira/browse/AIRAVATA-2152?focusedCommentId=15595600=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-15595600


https://issues.apache.org/jira/browse/AIRAVATA-2152?focusedCommentId=15595650=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-15595650

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata 
resolving-userStoragePreference-bug

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/65.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #65


commit 8422d23752dbf490c7c0a2f54fa13d6c2d617381
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-25T04:46:48Z

Resolving User storage preference bugs




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #63: adding token to credential summary model

2016-10-24 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/63

adding token to credential summary model

The token field was missing, which apparently is an dependency when 
configuring the User Compute Preference. 

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata add-token-SSH-Summary

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/63.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #63


commit 48ea4a0f7be09235011960612c64756ef55e52b7
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-25T00:19:44Z

adding token to credential summary model




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #59: uploading initial project structure

2016-10-19 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/59

uploading initial project structure

* Minimum bare bones implementation of thrift interface. 
* Next task would be to add the initial data-models 

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata allocation-manager

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/59.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #59


commit fd42b790bcc403405127c1bb9785c6e1708a13b6
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-19T19:08:16Z

uploading initial project structure




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #58: Initial Project Structure

2016-10-19 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/58
  
I did a git rebase, but thought of pulling the develop branch changes as 
well, But now I realized, it is not needed.

Doing a proper rebase.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #56: User compute resource bug resolve

2016-10-14 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/56

User compute resource bug resolve

Bug 1 : getUserResourceProfile will return null if the profile is not 
found, rather than an exception

Bug 2 : removeUserComputeResourcePreference is working now

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata user-compute-bug-resolve

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/56.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #56


commit dd319ce94ffb7db6729c724b0dbe3523bea0b338
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-14T19:38:42Z

resolving bug 1: getUserResourceProfile will return null if not found in DB

commit ff48f8c898b7160da6e646e55681bf6a92637549
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-14T20:04:26Z

resolving bug 2 : removeUserComputeResourcePreference is working now

commit e159a03165f38287551f708f44a832db7f9af630
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-14T20:04:54Z

Merge remote-tracking branch 'upstream/develop' into 
user-compute-bug-resolve




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #54: Adding SSH Credential summary data model

2016-10-12 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/54
  
@shamrath,

Here is the follow up JIRA : 
https://issues.apache.org/jira/browse/AIRAVATA-2163, and I have moved the 
credential store thrift file to data-models directory, though the actual data 
models will be created in credential-store modules directory.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #54: Adding SSH Credential summary data model

2016-10-12 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/54
  
@smarru & @shamrath,

Optimization to this PR may take some time. Since this PR is critical, 
Please consider merging. I will submit the changes as soon as possible with 
another pull request.

The build is passing in my local environment, don't know why Travis is 
failing.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #54: Adding SSH Credential summary data model

2016-10-12 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/54
  
All the festures requested are there in  this PR. But i am working on the
additional changes prescribed by shameera

On Oct 12, 2016 2:16 PM, "Suresh Marru" <notificati...@github.com> wrote:

Can we review and merge this now? I mean are you done working on this PR?

> On Oct 12, 2016, at 1:19 PM, Anuj Bhandar <notificati...@github.com>
wrote:
>
> @smarru <https://github.com/smarru>,
> Method to fetch specific user's public keys with summary is added
>
> —
> You are receiving this because you were mentioned.
> Reply to this email directly, view it on GitHub <
https://github.com/apache/airavata/pull/54#issuecomment-253278638>, or mute
the thread <https://github.com/notifications/unsubscribe-
auth/ACbXSjo-r85VddHayUhJa-y_SYvfh7oPks5qzRa4gaJpZM4KTEWl>.

>

—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<https://github.com/apache/airavata/pull/54#issuecomment-253294073>, or mute
the thread

<https://github.com/notifications/unsubscribe-auth/AOOY4bhzay3sRrxXSSXKQWcEbqqkG-u8ks5qzSQHgaJpZM4KTEWl>
.



---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #54: Adding SSH Credential summary data model

2016-10-12 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/54
  
@smarru,
Method to fetch specific user's public keys with summary is added


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #54: Adding SSH Credential summary data model

2016-10-11 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/54
  
@shamrath,

Indeed a good list of improvements, this way the Airavata Api will remain 
clutter free. I will start the development on these shortly. 


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...

2016-10-07 Thread anujbhan
Github user anujbhan closed the pull request at:

https://github.com/apache/airavata/pull/50


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...

2016-10-07 Thread anujbhan
GitHub user anujbhan reopened a pull request:

https://github.com/apache/airavata/pull/50

Feature request : User compute resource preference

**Note: This pull request is not ready for merging**

This feature adds the capability for user to define a user specific compute 
preference (Ex: An IU Big Red II account) for job scheduling.

1.  Created new Data model for User resource profile (Similar to 
GatewayResourceProfile but omitting unnecessary fields).
2.  Changes to Airavata Api thrift model, defined end points to consume the 
created Data model
3.  Changes to registry module to add new DB tables and handlers

   -  Some changes need to be discussed with the team, like handling 
the user-profile data model from registry
   -  Primary keys in User_Resource_Profile table and their respective 
handlers
   -  Some changes are pending, like validating the USER_ID field in 
User_Resource_Profile, since this change involves creating user table in 
registry, it needs to be discussed with the team.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata userComputeResource

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/50.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #50


commit 81c6ea841e265dc8f7f159e4bbe0d1457db2b213
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-03T00:57:28Z

Feature request: User Compute Preference

commit 8469effce22ffe3a54255d3920ee33b9d9035c06
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-07T15:48:58Z

correcting the registry code, testing not yet complete




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #50: Feature request : User compute resource preference

2016-10-07 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/50
  
Closing this pull request due to merge conflicts, will create a new branch 
with updated code


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...

2016-10-07 Thread anujbhan
Github user anujbhan closed the pull request at:

https://github.com/apache/airavata/pull/50


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata issue #49: Feature request : User compute resource preference

2016-10-02 Thread anujbhan
Github user anujbhan commented on the issue:

https://github.com/apache/airavata/pull/49
  
**this pull request was made by mistake, ignore**


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #50: Feature request : User compute resource preferenc...

2016-10-02 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/50

Feature request : User compute resource preference

**Note: This pull request is not ready for merging**

This feature adds the capability for user to define a user specific compute 
preference (Ex: An IU Big Red II account) for job scheduling.

1.  Created new Data model for User resource profile (Similar to 
GatewayResourceProfile but omitting unnecessary fields).
2.  Changes to Airavata Api thrift model, defined end points to consume the 
created Data model
3.  Changes to registry module to add new DB tables and handlers

   -  Some changes need to be discussed with the team, like handling 
the user-profile data model from registry
   -  Primary keys in User_Resource_Profile table and their respective 
handlers
   -  Some changes are pending, like validating the USER_ID field in 
User_Resource_Profile, since this change involves creating user table in 
registry, it needs to be discussed with the team.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata userComputeResource

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/50.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #50


commit 81c6ea841e265dc8f7f159e4bbe0d1457db2b213
Author: Anuj Bhandar <bhandar.a...@gmail.com>
Date:   2016-10-03T00:57:28Z

Feature request: User Compute Preference




---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #49: Feature request : User compute resource preferenc...

2016-10-02 Thread anujbhan
Github user anujbhan closed the pull request at:

https://github.com/apache/airavata/pull/49


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---


[GitHub] airavata pull request #49: Feature request : User compute resource preferenc...

2016-10-02 Thread anujbhan
GitHub user anujbhan opened a pull request:

https://github.com/apache/airavata/pull/49

Feature request : User compute resource preference

**Note: This pull request is not ready for merging**

This feature adds the capability for user to define a user specific compute 
preference (Ex: An IU Big Red II account) for job scheduling.

1.  Created new Data model for User resource profile (Similar to 
GatewayResourceProfile but omitting unnecessary fields).
2.  Changes to Airavata Api thrift model, defined end points to consume the 
created Data model
3.  Changes to registry module to add new DB tables and handlers

   -  Some changes need to be discussed with the team, like handling 
the user-profile data model from registry
   -  Primary keys in User_Resource_Profile table and their respective 
handlers
   -  Some changes are pending, like validating the USER_ID field in 
User_Resource_Profile, since this change involves creating user table in 
registry, it needs to be discussed with the team.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/anujbhan/airavata userComputeResource

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/airavata/pull/49.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #49


commit 24ced80054f084a78d86fff36672c834e144d3e9
Author: Jeff Kinnison <jeffdkinni...@gmail.com>
Date:   2016-06-10T20:46:02Z

add simstream module to airavata

commit 70f85795304e8ce719ffac50d41b5b31cf9fc800
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-07T15:42:47Z

creating new branch for grouper integration

commit 89e0fdc80740223c44e676a5de4ac36d6cddebcb
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-07T15:43:40Z

adding more files

commit c3ea76ed8ee74e1bf3059ddee0fbcb9185c29290
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-07T16:55:23Z

bug fix in search experiments and projects

commit 5d1f9e706848639301e7f9cbac95ed88c7435a58
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-07T19:46:55Z

fixing resource not found exception

commit 59449b28eae9ab112386e2d30b3b18891870d34c
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-07T20:23:49Z

fixing id not set issue

commit 2c1dc547567f6028ba81d290e6977749536283c9
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-07T20:33:13Z

fixing id not set issue

commit 9f57e42204938ac32ffbdf9aa5153118a1441eaf
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-07T20:48:17Z

fixing id not set issue

commit 639813231a297be0ac50a94050a9ae6341c7de3d
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-08T04:02:54Z

adding grouper config files to the bin directory

commit 35466d476e2db5b50286e934c556bcf3bcbb6929
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-08T22:55:39Z

fixing emptyIds bug

commit 52dc070d7acc3d0d5cb8d80416884bacb5f0d04d
Author: Vivek Sachdeva <vsachd...@cj.com>
Date:   2016-07-10T20:55:22Z

Add method to get user memberships. Allow the owner of the group to make 
updates

commit 6148dabfbb3e4d1c794988b23018596b06a3e361
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-11T16:38:21Z

fixing get all users error

commit 7c6a11d3ab871c2687d08695fbf1421ad5fcabde
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-11T19:38:40Z

fixing throw exception issue

commit 171ee0c26354f1cea131a2bbed81557283090da1
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-11T22:48:46Z

WIP

commit eaf20ccf26819132d17aed02aed8601383298d54
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-12T15:49:42Z

adding Group Management related API methods

commit 2e7ecb3f95d0cd33635b11493bbf64d54e99d71e
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-12T16:01:09Z

adding missing files

commit d12f590e807c84310e879b9c3241a748ba7a553f
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-12T23:24:57Z

fixing getAllAccessibleUsers issue

commit 5f9dacea192c250ab18551423974b43f394c3659
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-12T23:25:48Z

removing main method added for testing

commit 620d9fb6aecadff92c95aa27a28517d62d5a7684
Author: scnakandala <supun.nakand...@gmail.com>
Date:   2016-07-13T05:31:48Z

Merge branch 'develop' of https://git-wip-us.apache.org/repos/asf/airavata 
into grouper-integration

# Conflicts:
#   
airavata-api/airavata-api-server/src/main/java/org/apache/airavata/api/server/handler/AiravataServerHandler.java
#   
airavata-api/airavata-api-stubs/src/main/java/org/apache/aira