Roles management issue with pac4j-oidc + keycloak/shiro

966 views
Skip to first unread message

esirem malaysia

unread,
Nov 7, 2019, 11:51:25 AM11/7/19
to Pac4j development mailing list
Hi

I 'm trying to retrieve roles from Keycloak users to Zeppelin Server which uses Shiro Authentification but I got this error even if I use the newest following pac4j version (buji-pac4j-4.1.1, pac4j-oidc-3.8.3, pac4j-core-3.8.3) and the new Keycloak classes implemented by Jérôme LELEU into pac4j-oidc : 

INFO [2019-11-07 14:58:30,866] ({main} ContextHandler.java[log]:2345) - Initializing Shiro environment
INFO [2019-11-07 14:58:30,867] ({main} EnvironmentLoader.java[initEnvironment]:133) - Starting Shiro environment initialization.
ERROR [2019-11-07 14:58:31,038] ({main} EnvironmentLoader.java[initEnvironment]:152) - Shiro environment initialization failed
java.lang.IllegalArgumentException: Line argument must contain a key and a value.  Only one string token was found.
at org.apache.shiro.config.Ini$Section.splitKeyValue(Ini.java:601)
at org.apache.shiro.config.Ini$Section.toMapProps(Ini.java:626)
at org.apache.shiro.config.Ini$Section.<init>(Ini.java:523)
at org.apache.shiro.config.Ini$Section.<init>(Ini.java:504)
at org.apache.shiro.config.Ini.addSection(Ini.java:361)
at org.apache.shiro.config.Ini.load(Ini.java:393)
at org.apache.shiro.config.Ini.load(Ini.java:295)
at org.apache.shiro.config.Ini.load(Ini.java:283)
at org.apache.shiro.web.env.IniWebEnvironment.convertPathToIni(IniWebEnvironment.java:355)
at org.apache.shiro.web.env.IniWebEnvironment.createIni(IniWebEnvironment.java:244)
at org.apache.shiro.web.env.IniWebEnvironment.getSpecifiedIni(IniWebEnvironment.java:185)
at org.apache.shiro.web.env.IniWebEnvironment.parseConfig(IniWebEnvironment.java:96)
at org.apache.shiro.web.env.IniWebEnvironment.init(IniWebEnvironment.java:69)
at org.apache.shiro.util.LifecycleUtils.init(LifecycleUtils.java:45)
at org.apache.shiro.util.LifecycleUtils.init(LifecycleUtils.java:40)
at org.apache.shiro.web.env.EnvironmentLoader.createEnvironment(EnvironmentLoader.java:313)
at org.apache.shiro.web.env.EnvironmentLoader.initEnvironment(EnvironmentLoader.java:139)
at org.apache.shiro.web.env.EnvironmentLoaderListener.contextInitialized(EnvironmentLoaderListener.java:58)
at org.eclipse.jetty.server.handler.ContextHandler.callContextInitialized(ContextHandler.java:957)
at org.eclipse.jetty.servlet.ServletContextHandler.callContextInitialized(ServletContextHandler.java:552)
at org.eclipse.jetty.server.handler.ContextHandler.startContext(ContextHandler.java:922)
at org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:364)
at org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1497)
at org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1459)
at org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:852)
at org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:278)
at org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:545)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:138)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:117)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:113)
at org.eclipse.jetty.server.handler.ContextHandlerCollection.doStart(ContextHandlerCollection.java:168)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68)
at org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:138)
at org.eclipse.jetty.server.Server.start(Server.java:415)
at org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:108)
at org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:113)
at org.eclipse.jetty.server.Server.doStart(Server.java:382)
at org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:68)
at org.apache.zeppelin.server.ZeppelinServer.main(ZeppelinServer.java:241)

And so no access to Zeppelin interface. Can you show me how to configure shiro.ini (full version) ? I tried 2 configurations, here it is.

1) In the case of using Oidc (pac4j-oidc) classes, I got this configuration in my shiro.ini : 

[main]
roleAdminAuthGenerator = org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator

oidcConfig = org.pac4j.oidc.config.OidcConfiguration
oidcConfig.clientId = zeppelin-client
oidcConfig.secret = <SECRET>
oidcConfig.clientAuthenticationMethodAsString = client_secret_basic
oidcConfig.scope = openid
oidcConfig.useNonce = true
oidcConfig.responseType = code

oidcClient = org.pac4j.oidc.client.OidcClient
oidcClient.configuration = $oidcConfig
oidcClient.authorizationGenerator = $roleAdminAuthGenerator

clients = org.pac4j.core.client.Clients
clients.clients = $oidcClient

requireRoleAdmin = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
requireRoleAdmin.elements = admin_role

config = org.pac4j.core.config.Config
config.clients = $clients
config.authorizers = admin:$requireRoleAdmin

pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
pac4jRealm.principalNameAttribute=preferred_username
pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory

### If caching of user is required then uncomment below lines
#cacheManager = org.apache.shiro.cache.MemoryConstrainedCacheManager
#securityManager.cacheManager = $cacheManager
sessionManager = org.apache.shiro.web.session.mgt.DefaultWebSessionManager
securityManager.sessionManager = $sessionManager
securityManager.sessionManager.globalSessionTimeout = 86400000
securityManager.subjectFactory = $pac4jSubjectFactory
securityManager.realms = $pac4jRealm

oidcSecurityFilter = io.buji.pac4j.filter.SecurityFilter
oidcSecurityFilter.config = $config
oidcSecurityFilter.clients = oidcClient

logoutFilter = io.buji.pac4j.filter.LogoutFilter
logoutFilter.defaultUrl = http://localhost:8080
logoutFilter.localLogout = true
logoutFilter.centralLogout = true
logoutFilter.config = $config

callbackFilter = io.buji.pac4j.filter.CallbackFilter
callbackFilter.defaultUrl = http://localhost:8080
callbackFilter.config = $config

[urls]
/api/version = anon
/api/callback = callbackFilter
/** = oidcSecurityFilter
/api/login/logout = logoutFilter


RESULT 1 : Can successfully login to zeppelin via Keycloak users contrary of using KeycloakOidc classes, BUT can't retrieve roles, the array is actually empty as Dali noticed in a previous post. Here what I've got : {"status":"OK","message":"","body":{"principal":"user1","ticket":"109144f3-2038-4922-b025-f1d4d8abd86a","roles":"[]"}}. So, I'm getting always an empty array and the Zeppelin logout API does not work also (which is another problem).

2) In the case of using KeycloakOidc (pac4j-oidc) classes as Jérôme LELEU recommended in a previous post, I got this configuration in my shiro.ini : 

[main]
roleAdminAuthGenerator = org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator
roleAdminAuthGenerator.roleAttributes = admin_role

oidcConfig = org.pac4j.oidc.config.KeycloakOidcConfiguration
oidcConfig.clientId = zeppelin-client
oidcConfig.secret = <SECRET>
oidcConfig.realm = zeppelin
# base uri of keycloak. For instance `http://localhost:5000/auth`. This attribute is then concataned with **"/realms/"+realm+"/.well-known/openid-configuration"**
oidcConfig.baseUri = http://localhost:5000/auth
oidcConfig.useNonce = true
oidcConfig.clientAuthenticationMethodAsString = client_secret_basic

keycloakOidcClient = org.pac4j.oidc.client.KeycloakOidcClient
keycloakOidcClient.configuration = $oidcConfig
keycloakOidcClient.authorizationGenerator = $roleAdminAuthGenerator

clients = org.pac4j.core.client.Clients
clients.clients = $keycloakOidcClient

requireRoleAdmin = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
requireRoleAdmin.elements = admin_role
requireRoleUser = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
requireRoleUser.elements = admin_role, user_role

config = org.pac4j.core.config.Config
config.clients = $clients
config.authorizers = admin:$requireRoleAdmin,user:$requireRoleUser

pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
pac4jRealm.principalNameAttribute = preferred_username
pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory

oidcSecurityFilter = io.buji.pac4j.filter.SecurityFilter
oidcSecurityFilter.config = $config
oidcSecurityFilter.clients = keycloakOidcClient

sessionManager = org.apache.shiro.web.session.mgt.DefaultWebSessionManager
#securityManager.realms = $pac4jRealm
securityManager.subjectFactory = $pac4jSubjectFactory
securityManager.sessionManager = $sessionManager
securityManager.sessionManager.globalSessionTimeout = 86400000

callbackFilter = io.buji.pac4j.filter.CallbackFilter
callbackFilter.defaultUrl = http://localhost:8080
callbackFilter.config = $config

logoutFilter = io.buji.pac4j.filter.LogoutFilter
logoutFilter.defaultUrl = http://localhost:8080
logoutFilter.localLogout = true
logoutFilter.centralLogout = true
logoutFilter.config = $config

[urls]
/api/version = anon
/api/callback = callbackFilter
/api/login/logout = logoutFilter
/** = oidcSecurityFilter


RESULT 2 : Cannot login to zeppelin via Keycloak and getting errors in logs as shown above. And so NO access to Zeppelin and Roles. With this configuration nothing works.

Can you please debug me on this point. And also does this admin_role and user_role needs to be configured in keycloak as defined in this shiro.ini ? I think it is related to role based authorization, can you please tell me some information related to role based authorization ?
I will be grateful to have another point of view which can clear my actual issue. Thanks in advance.

Kind regards,
Esirem.

Jérôme LELEU

unread,
Nov 8, 2019, 10:16:16 AM11/8/19
to esirem malaysia, Pac4j development mailing list
Hi,

2) Can you turn on TRACE logs on org.apache.shiro ?
Thanks.
Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/pac4j-dev/31603baf-995c-44c6-9a26-856a0e696d3f%40googlegroups.com.

esirem malaysia

unread,
Nov 11, 2019, 7:51:08 AM11/11/19
to Pac4j development mailing list
Hi Jérôme, 

As you asked I turn on TRACE logs on org.apache.shiro. Here the actual output :

INFO [2019-11-11 13:31:35,403] ({main} EnvironmentLoader.java[initEnvironment]:133) - Starting Shiro environment initialization.
TRACE [2019-11-11 13:31:35,473] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [WebAppClassLoader=zeppelin-web@3b07a0d6]
TRACE [2019-11-11 13:31:35,474] ({main} ClassUtils.java[forName]:135) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the thread context ClassLoader.  Trying the current ClassLoader...
TRACE [2019-11-11 13:31:35,475] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
TRACE [2019-11-11 13:31:35,475] ({main} ClassUtils.java[forName]:143) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the current ClassLoader.  Trying the system/application ClassLoader...
TRACE [2019-11-11 13:31:35,476] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
DEBUG [2019-11-11 13:31:35,485] ({main} IniWebEnvironment.java[parseConfig]:95) - Checking any specified config locations.
DEBUG [2019-11-11 13:31:35,486] ({main} ResourceUtils.java[loadFromFile]:147) - Opening file [/home/user/Documents/ZeppelinNonRoot/zeppelin_0.8.2_v2/conf/shiro.ini]...
DEBUG [2019-11-11 13:31:35,493] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-11 13:31:35,503] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: roleAdminAuthGenerator = org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator
TRACE [2019-11-11 13:31:35,504] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig = org.pac4j.oidc.config.KeycloakOidcConfiguration
TRACE [2019-11-11 13:31:35,504] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.baseUri = http://localhost:5000/auth
TRACE [2019-11-11 13:31:35,505] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientId = zeppelin-client
TRACE [2019-11-11 13:31:35,505] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.secret = 04814074-86aa-43dd-80ec-c9b1977573eb
TRACE [2019-11-11 13:31:35,506] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.realm = zeppelin
TRACE [2019-11-11 13:31:35,506] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientAuthenticationMethodAsString = client_secret_basic
TRACE [2019-11-11 13:31:35,510] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.scope = openid
TRACE [2019-11-11 13:31:35,511] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.useNonce = true
TRACE [2019-11-11 13:31:35,511] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.responseType = code
TRACE [2019-11-11 13:31:35,512] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.logoutUrl = http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout
TRACE [2019-11-11 13:31:35,512] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient = org.pac4j.oidc.client.KeycloakOidcClient
TRACE [2019-11-11 13:31:35,513] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.configuration = $oidcConfig
TRACE [2019-11-11 13:31:35,513] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.authorizationGenerator = $roleAdminAuthGenerator
TRACE [2019-11-11 13:31:35,514] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-11 13:31:35,514] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.callbackUrl = http://localhost:8080/api/callback
TRACE [2019-11-11 13:31:35,514] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.clients = $oidcClient
TRACE [2019-11-11 13:31:35,515] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
TRACE [2019-11-11 13:31:35,515] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin.elements = admin_role
TRACE [2019-11-11 13:31:35,516] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleUser = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
TRACE [2019-11-11 13:31:35,516] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleUser.elements = admin_role, user_role
TRACE [2019-11-11 13:31:35,517] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-11 13:31:35,517] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-11 13:31:35,517] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.authorizers = admin:$requireRoleAdmin,user:$requireRoleUser
TRACE [2019-11-11 13:31:35,518] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-11 13:31:35,518] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm.principalNameAttribute = preferred_username
TRACE [2019-11-11 13:31:35,518] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-11 13:31:35,519] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: sessionManager = org.apache.shiro.web.session.mgt.DefaultWebSessionManager
TRACE [2019-11-11 13:31:35,519] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.realms = $pac4jRealm
TRACE [2019-11-11 13:31:35,520] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-11 13:31:35,520] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager = $sessionManager
TRACE [2019-11-11 13:31:35,521] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager.globalSessionTimeout = 86400000
TRACE [2019-11-11 13:31:35,521] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter = io.buji.pac4j.filter.SecurityFilter
TRACE [2019-11-11 13:31:35,521] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.config = $config
TRACE [2019-11-11 13:31:35,522] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.clients = oidcClient
TRACE [2019-11-11 13:31:35,522] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-11 13:31:35,522] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-11 13:31:35,522] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
TRACE [2019-11-11 13:31:35,523] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter = io.buji.pac4j.filter.LogoutFilter
TRACE [2019-11-11 13:31:35,523] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-11 13:31:35,523] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.localLogout = true
TRACE [2019-11-11 13:31:35,524] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.centralLogout = true
TRACE [2019-11-11 13:31:35,524] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.config = $config
DEBUG [2019-11-11 13:31:35,524] ({main} Ini.java[load]:401) - Parsing [urls]
TRACE [2019-11-11 13:31:35,525] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/version = anon
TRACE [2019-11-11 13:31:35,526] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/callback = callbackFilter
TRACE [2019-11-11 13:31:35,526] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /** = oidcSecurityFilter
TRACE [2019-11-11 13:31:35,526] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/login/logout = logoutFilter
DEBUG [2019-11-11 13:31:35,527] ({main} ResourceUtils.java[loadFromClassPath]:159) - Opening resource from class path [buji-pac4j-default.ini]
DEBUG [2019-11-11 13:31:35,529] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-11 13:31:35,530] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-11 13:31:35,530] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-11 13:31:35,530] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-11 13:31:35,531] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-11 13:31:35,531] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-11 13:31:35,532] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-11 13:31:35,532] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-11 13:31:35,532] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
DEBUG [2019-11-11 13:31:35,535] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-11 13:31:35,667] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
DEBUG [2019-11-11 13:31:35,714] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$clients'.  Looking up object with id 'clients'
TRACE [2019-11-11 13:31:35,716] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [#Clients# | callbackUrl: null | clients: null | ajaxRequestResolver: null | callbackUrlResolver: null | authorizationGenerators: [] | defaultSecurityClients: null | urlResolver: null |] on object of type [org.pac4j.core.config.Config]
DEBUG [2019-11-11 13:31:35,754] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jSubjectFactory'.  Looking up object with id 'pac4jSubjectFactory'
TRACE [2019-11-11 13:31:35,754] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [subjectFactory] value [io.buji.pac4j.subject.Pac4jSubjectFactory@6c779568] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-11 13:31:35,767] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-11 13:31:35,767] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.CallbackFilter]
TRACE [2019-11-11 13:31:35,801] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [baseUri] value [http://localhost:5000/auth] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,801] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientId] value [zeppelin-client] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,802] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [secret] value [04814074-86aa-43dd-80ec-c9b1977573eb] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,802] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [realm] value [zeppelin] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,803] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientAuthenticationMethodAsString] value [client_secret_basic] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,804] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [scope] value [openid] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,805] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [useNonce] value [true] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,805] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [responseType] value [code] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-11 13:31:35,806] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [logoutUrl] value [http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
DEBUG [2019-11-11 13:31:35,833] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcConfig'.  Looking up object with id 'oidcConfig'
TRACE [2019-11-11 13:31:35,834] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [configuration] value [#KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 |] on object of type [org.pac4j.oidc.client.KeycloakOidcClient]
DEBUG [2019-11-11 13:31:35,834] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$roleAdminAuthGenerator'.  Looking up object with id 'roleAdminAuthGenerator'
TRACE [2019-11-11 13:31:35,835] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizationGenerator] value [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7] on object of type [org.pac4j.oidc.client.KeycloakOidcClient]
TRACE [2019-11-11 13:31:35,839] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [callbackUrl] value [http://localhost:8080/api/callback] on object of type [org.pac4j.core.client.Clients]
DEBUG [2019-11-11 13:31:35,840] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
DEBUG [2019-11-11 13:31:35,840] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
TRACE [2019-11-11 13:31:35,841] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [[#KeycloakOidcClient# | name: KeycloakOidcClient | callbackUrl: null | callbackUrlResolver: null | ajaxRequestResolver: null | redirectActionBuilder: null | credentialsExtractor: null | authenticator: null | profileCreator: org.pac4j.core.profile.creator.AuthenticatorProfileCreator@193f604a | logoutActionBuilder: org.pac4j.core.logout.NoLogoutActionBuilder@20f5239f | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |]] on object of type [org.pac4j.core.client.Clients]
TRACE [2019-11-11 13:31:35,852] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [elements] value [[admin_role]] on object of type [org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer]
TRACE [2019-11-11 13:31:35,854] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [elements] value [[admin_role, user_role]] on object of type [org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer]
DEBUG [2019-11-11 13:31:35,854] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$requireRoleAdmin'.  Looking up object with id 'requireRoleAdmin'
DEBUG [2019-11-11 13:31:35,855] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$requireRoleUser'.  Looking up object with id 'requireRoleUser'
TRACE [2019-11-11 13:31:35,855] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizers] value [{admin=org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer@33990a0c, user=org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer@4de4b452}] on object of type [org.pac4j.core.config.Config]
TRACE [2019-11-11 13:31:35,867] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [principalNameAttribute] value [preferred_username] on object of type [io.buji.pac4j.realm.Pac4jRealm]
DEBUG [2019-11-11 13:31:35,867] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-11 13:31:35,868] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
DEBUG [2019-11-11 13:31:35,870] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
DEBUG [2019-11-11 13:31:35,870] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
TRACE [2019-11-11 13:31:35,870] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [realms] value [[io.buji.pac4j.realm.Pac4jRealm@4d02f94e]] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-11 13:31:35,871] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$sessionManager'.  Looking up object with id 'sessionManager'
TRACE [2019-11-11 13:31:35,871] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager] value [org.apache.shiro.web.session.mgt.DefaultWebSessionManager@1e683a3e] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
TRACE [2019-11-11 13:31:35,885] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager.globalSessionTimeout] value [86400000] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-11 13:31:35,901] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-11 13:31:35,902] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-11 13:31:35,902] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [oidcClient] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-11 13:31:35,903] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.CallbackFilter]
TRACE [2019-11-11 13:31:35,908] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-11 13:31:35,908] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [localLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-11 13:31:35,909] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [centralLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
DEBUG [2019-11-11 13:31:35,909] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-11 13:31:35,910] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.LogoutFilter]
DEBUG [2019-11-11 13:31:35,910] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-11 13:31:35,910] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
 INFO [2019-11-11 13:31:35,910] ({main} IniSecurityManagerFactory.java[isAutoApplyRealms]:127) - Realms have been explicitly set on the SecurityManager instance - auto-setting of realms will not occur.
DEBUG [2019-11-11 13:31:35,911] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-11 13:31:35,914] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
TRACE [2019-11-11 13:31:35,915] ({main} IniFilterChainResolverFactory.java[createChains]:185) - Before url processing.
DEBUG [2019-11-11 13:31:35,916] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/version] from String definition [anon]
DEBUG [2019-11-11 13:31:35,916] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/version] to filter [anon] with config [null]
DEBUG [2019-11-11 13:31:35,917] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/callback] from String definition [callbackFilter]
DEBUG [2019-11-11 13:31:35,918] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/callback] to filter [io.buji.pac4j.filter.CallbackFilter@25fb8912] with config [null]
DEBUG [2019-11-11 13:31:35,918] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/**] from String definition [oidcSecurityFilter]
DEBUG [2019-11-11 13:31:35,918] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/**] to filter [io.buji.pac4j.filter.SecurityFilter@7c24b813] with config [null]
DEBUG [2019-11-11 13:31:35,918] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/login/logout] from String definition [logoutFilter]
DEBUG [2019-11-11 13:31:35,918] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/login/logout] to filter [io.buji.pac4j.filter.LogoutFilter@2c35e847] with config [null]
DEBUG [2019-11-11 13:31:35,919] ({main} EnvironmentLoader.java[initEnvironment]:142) - Published WebEnvironment as ServletContext attribute with name [org.apache.shiro.web.env.EnvironmentLoader.ENVIRONMENT_ATTRIBUTE_KEY]
 INFO [2019-11-11 13:31:35,919] ({main} EnvironmentLoader.java[initEnvironment]:147) - Shiro environment initialized in 509 ms.
TRACE [2019-11-11 13:31:36,400] ({main} ThreadContext.java[get]:126) - get() - in thread [main]
ERROR [2019-11-11 13:31:39,018] ({main} HeliumOnlineRegistry.java[getAll]:80) - proxy.corp.anon: Name or service not known

Maybe I made a mistake on my configuration on the shiro.ini file, can you check if there is a misconfiguration somewhere above.

Kind regards,
Esirem.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4...@googlegroups.com.

Jérôme LELEU

unread,
Nov 12, 2019, 2:20:13 AM11/12/19
to esirem malaysia, Pac4j development mailing list
Hi,

I don't understand: the initialization works, I don't see the "Shiro environment initialization failed"...
Thanks.
Best regards,
Jérôme


To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/pac4j-dev/60decaa6-c233-4ee0-a467-3640bff421fa%40googlegroups.com.

esirem malaysia

unread,
Nov 12, 2019, 5:06:09 AM11/12/19
to Pac4j development mailing list
Hi,

Yes there is no more "Shiro environment initialization failed" because I removed  this line"roleAdminAuthGenerator.roleAttributes = admin_role"  from the shiro.ini configfile because I found out that there is no 'roleAttributes'  variable inside OidcConfiguration.java and KeycloakOidcConfiguration.java. But other errors still remaining, I am not redirecting to keycloak authentification interface when I browse to zeppelin URL, I'am actually stuck on this zeppelin page and there is no other way to enter in it (and when I was using OidcConfiguration.java instead of KeycloakOidcConfiguration.java, I was redirecting succesfully to keycloak, but in that case nothing happens). 

zeppelin_problem.PNG


And also above I don't paste the full TRACE logs because I just run zeppelin and quickly take the logs I've got, so as you said the initialization seems to work "apparently" (but it is not in my case). So I just re-run the zeppelin server and go into Mozilla to access it, and then some other logs come with strange behavior (which I do not have with the simple OidcConfiguration.java class) : org.apache.shiro.session.UnknownSessionException: There is no session with id [44e0ac48-17f3-481c-bf26-4f0c2e46f165]. 

Here the full TRACE logs after redirecting to zeppelin on my browser : 


INFO [2019-11-12 10:52:15,464] ({main} EnvironmentLoader.java[initEnvironment]:133) - Starting Shiro environment initialization.
TRACE [2019-11-12 10:52:15,536] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [WebAppClassLoader=zeppelin-web@3b07a0d6]
TRACE [2019-11-12 10:52:15,537] ({main} ClassUtils.java[forName]:135) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the thread context ClassLoader.  Trying the current ClassLoader...
TRACE [2019-11-12 10:52:15,538] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
TRACE [2019-11-12 10:52:15,539] ({main} ClassUtils.java[forName]:143) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the current ClassLoader.  Trying the system/application ClassLoader...
TRACE [2019-11-12 10:52:15,540] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
DEBUG [2019-11-12 10:52:15,549] ({main} IniWebEnvironment.java[parseConfig]:95) - Checking any specified config locations.
DEBUG [2019-11-12 10:52:15,551] ({main} ResourceUtils.java[loadFromFile]:147) - Opening file [/home/user/Documents/ZeppelinNonRoot/zeppelin_0.8.2_v2/conf/shiro.ini]...
DEBUG [2019-11-12 10:52:15,557] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-12 10:52:15,568] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: roleAdminAuthGenerator = org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator
TRACE [2019-11-12 10:52:15,568] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig = org.pac4j.oidc.config.KeycloakOidcConfiguration
TRACE [2019-11-12 10:52:15,569] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.baseUri = http://localhost:5000/auth
TRACE [2019-11-12 10:52:15,569] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientId = zeppelin-client
TRACE [2019-11-12 10:52:15,570] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.secret = 04814074-86aa-43dd-80ec-c9b1977573eb
TRACE [2019-11-12 10:52:15,570] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.realm = zeppelin
TRACE [2019-11-12 10:52:15,571] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientAuthenticationMethodAsString = client_secret_basic
TRACE [2019-11-12 10:52:15,575] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.scope = openid
TRACE [2019-11-12 10:52:15,575] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.useNonce = true
TRACE [2019-11-12 10:52:15,576] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.responseType = code
TRACE [2019-11-12 10:52:15,576] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.logoutUrl = http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout
TRACE [2019-11-12 10:52:15,576] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient = org.pac4j.oidc.client.KeycloakOidcClient
TRACE [2019-11-12 10:52:15,577] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.configuration = $oidcConfig
TRACE [2019-11-12 10:52:15,577] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.authorizationGenerator = $roleAdminAuthGenerator
TRACE [2019-11-12 10:52:15,577] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-12 10:52:15,578] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.callbackUrl = http://localhost:8080/api/callback
TRACE [2019-11-12 10:52:15,579] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.clients = $oidcClient
TRACE [2019-11-12 10:52:15,579] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
TRACE [2019-11-12 10:52:15,580] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin.elements = admin_role
TRACE [2019-11-12 10:52:15,580] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleUser = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
TRACE [2019-11-12 10:52:15,581] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleUser.elements = admin_role, user_role
TRACE [2019-11-12 10:52:15,581] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-12 10:52:15,582] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-12 10:52:15,582] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.authorizers = admin:$requireRoleAdmin,user:$requireRoleUser
TRACE [2019-11-12 10:52:15,583] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-12 10:52:15,583] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm.principalNameAttribute = preferred_username
TRACE [2019-11-12 10:52:15,583] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-12 10:52:15,584] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: sessionManager = org.apache.shiro.web.session.mgt.DefaultWebSessionManager
TRACE [2019-11-12 10:52:15,584] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.realms = $pac4jRealm
TRACE [2019-11-12 10:52:15,584] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-12 10:52:15,585] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager = $sessionManager
TRACE [2019-11-12 10:52:15,585] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager.globalSessionTimeout = 86400000
TRACE [2019-11-12 10:52:15,585] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter = io.buji.pac4j.filter.SecurityFilter
TRACE [2019-11-12 10:52:15,586] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.config = $config
TRACE [2019-11-12 10:52:15,586] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.clients = oidcClient
TRACE [2019-11-12 10:52:15,587] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-12 10:52:15,587] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-12 10:52:15,587] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
TRACE [2019-11-12 10:52:15,588] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter = io.buji.pac4j.filter.LogoutFilter
TRACE [2019-11-12 10:52:15,589] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-12 10:52:15,589] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.localLogout = true
TRACE [2019-11-12 10:52:15,589] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.centralLogout = true
TRACE [2019-11-12 10:52:15,590] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.config = $config
DEBUG [2019-11-12 10:52:15,590] ({main} Ini.java[load]:401) - Parsing [urls]
TRACE [2019-11-12 10:52:15,591] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/version = anon
TRACE [2019-11-12 10:52:15,592] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/callback = callbackFilter
TRACE [2019-11-12 10:52:15,592] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /** = oidcSecurityFilter
TRACE [2019-11-12 10:52:15,593] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/login/logout = logoutFilter
DEBUG [2019-11-12 10:52:15,593] ({main} ResourceUtils.java[loadFromClassPath]:159) - Opening resource from class path [buji-pac4j-default.ini]
DEBUG [2019-11-12 10:52:15,595] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-12 10:52:15,610] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-12 10:52:15,611] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-12 10:52:15,611] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-12 10:52:15,611] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-12 10:52:15,612] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-12 10:52:15,612] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-12 10:52:15,613] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-12 10:52:15,613] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
DEBUG [2019-11-12 10:52:15,615] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-12 10:52:15,810] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
DEBUG [2019-11-12 10:52:15,880] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$clients'.  Looking up object with id 'clients'
TRACE [2019-11-12 10:52:15,882] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [#Clients# | callbackUrl: null | clients: null | ajaxRequestResolver: null | callbackUrlResolver: null | authorizationGenerators: [] | defaultSecurityClients: null | urlResolver: null |] on object of type [org.pac4j.core.config.Config]
DEBUG [2019-11-12 10:52:15,931] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jSubjectFactory'.  Looking up object with id 'pac4jSubjectFactory'
TRACE [2019-11-12 10:52:15,931] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [subjectFactory] value [io.buji.pac4j.subject.Pac4jSubjectFactory@6c779568] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-12 10:52:15,945] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-12 10:52:15,945] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.CallbackFilter]
TRACE [2019-11-12 10:52:15,984] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [baseUri] value [http://localhost:5000/auth] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,985] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientId] value [zeppelin-client] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,986] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [secret] value [04814074-86aa-43dd-80ec-c9b1977573eb] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,987] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [realm] value [zeppelin] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,987] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientAuthenticationMethodAsString] value [client_secret_basic] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,988] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [scope] value [openid] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,989] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [useNonce] value [true] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,989] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [responseType] value [code] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-12 10:52:15,990] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [logoutUrl] value [http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
DEBUG [2019-11-12 10:52:16,024] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcConfig'.  Looking up object with id 'oidcConfig'
TRACE [2019-11-12 10:52:16,024] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [configuration] value [#KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 |] on object of type [org.pac4j.oidc.client.KeycloakOidcClient]
DEBUG [2019-11-12 10:52:16,026] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$roleAdminAuthGenerator'.  Looking up object with id 'roleAdminAuthGenerator'
TRACE [2019-11-12 10:52:16,026] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizationGenerator] value [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7] on object of type [org.pac4j.oidc.client.KeycloakOidcClient]
TRACE [2019-11-12 10:52:16,033] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [callbackUrl] value [http://localhost:8080/api/callback] on object of type [org.pac4j.core.client.Clients]
DEBUG [2019-11-12 10:52:16,033] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
DEBUG [2019-11-12 10:52:16,034] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
TRACE [2019-11-12 10:52:16,034] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [[#KeycloakOidcClient# | name: KeycloakOidcClient | callbackUrl: null | callbackUrlResolver: null | ajaxRequestResolver: null | redirectActionBuilder: null | credentialsExtractor: null | authenticator: null | profileCreator: org.pac4j.core.profile.creator.AuthenticatorProfileCreator@193f604a | logoutActionBuilder: org.pac4j.core.logout.NoLogoutActionBuilder@20f5239f | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |]] on object of type [org.pac4j.core.client.Clients]
TRACE [2019-11-12 10:52:16,050] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [elements] value [[admin_role]] on object of type [org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer]
TRACE [2019-11-12 10:52:16,051] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [elements] value [[admin_role, user_role]] on object of type [org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer]
DEBUG [2019-11-12 10:52:16,052] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$requireRoleAdmin'.  Looking up object with id 'requireRoleAdmin'
DEBUG [2019-11-12 10:52:16,052] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$requireRoleUser'.  Looking up object with id 'requireRoleUser'
TRACE [2019-11-12 10:52:16,053] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizers] value [{admin=org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer@33990a0c, user=org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer@4de4b452}] on object of type [org.pac4j.core.config.Config]
TRACE [2019-11-12 10:52:16,066] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [principalNameAttribute] value [preferred_username] on object of type [io.buji.pac4j.realm.Pac4jRealm]
DEBUG [2019-11-12 10:52:16,067] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-12 10:52:16,067] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
DEBUG [2019-11-12 10:52:16,069] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
DEBUG [2019-11-12 10:52:16,069] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
TRACE [2019-11-12 10:52:16,070] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [realms] value [[io.buji.pac4j.realm.Pac4jRealm@4d02f94e]] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-12 10:52:16,070] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$sessionManager'.  Looking up object with id 'sessionManager'
TRACE [2019-11-12 10:52:16,071] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager] value [org.apache.shiro.web.session.mgt.DefaultWebSessionManager@1e683a3e] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
TRACE [2019-11-12 10:52:16,085] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager.globalSessionTimeout] value [86400000] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-12 10:52:16,104] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-12 10:52:16,105] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-12 10:52:16,105] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [oidcClient] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-12 10:52:16,106] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.CallbackFilter]
TRACE [2019-11-12 10:52:16,112] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-12 10:52:16,113] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [localLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-12 10:52:16,114] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [centralLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
DEBUG [2019-11-12 10:52:16,114] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-12 10:52:16,114] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.LogoutFilter]
DEBUG [2019-11-12 10:52:16,115] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-12 10:52:16,115] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
 INFO [2019-11-12 10:52:16,115] ({main} IniSecurityManagerFactory.java[isAutoApplyRealms]:127) - Realms have been explicitly set on the SecurityManager instance - auto-setting of realms will not occur.
DEBUG [2019-11-12 10:52:16,116] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-12 10:52:16,119] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
TRACE [2019-11-12 10:52:16,121] ({main} IniFilterChainResolverFactory.java[createChains]:185) - Before url processing.
DEBUG [2019-11-12 10:52:16,121] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/version] from String definition [anon]
DEBUG [2019-11-12 10:52:16,122] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/version] to filter [anon] with config [null]
DEBUG [2019-11-12 10:52:16,124] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/callback] from String definition [callbackFilter]
DEBUG [2019-11-12 10:52:16,124] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/callback] to filter [io.buji.pac4j.filter.CallbackFilter@25fb8912] with config [null]
DEBUG [2019-11-12 10:52:16,125] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/**] from String definition [oidcSecurityFilter]
DEBUG [2019-11-12 10:52:16,125] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/**] to filter [io.buji.pac4j.filter.SecurityFilter@7c24b813] with config [null]
DEBUG [2019-11-12 10:52:16,125] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/login/logout] from String definition [logoutFilter]
DEBUG [2019-11-12 10:52:16,126] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/login/logout] to filter [io.buji.pac4j.filter.LogoutFilter@2c35e847] with config [null]
DEBUG [2019-11-12 10:52:16,126] ({main} EnvironmentLoader.java[initEnvironment]:142) - Published WebEnvironment as ServletContext attribute with name [org.apache.shiro.web.env.EnvironmentLoader.ENVIRONMENT_ATTRIBUTE_KEY]
 INFO [2019-11-12 10:52:16,127] ({main} EnvironmentLoader.java[initEnvironment]:147) - Shiro environment initialized in 656 ms.
TRACE [2019-11-12 10:52:16,844] ({main} ThreadContext.java[get]:126) - get() - in thread [main]
TRACE [2019-11-12 10:52:39,600] ({qtp89387388-15} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-12 10:52:39,638] ({qtp89387388-15} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
DEBUG [2019-11-12 10:52:39,640] ({qtp89387388-15} AbstractValidatingSessionManager.java[createSessionValidationScheduler]:213) - No sessionValidationScheduler set.  Attempting to create default instance.
TRACE [2019-11-12 10:52:39,642] ({qtp89387388-15} AbstractValidatingSessionManager.java[createSessionValidationScheduler]:218) - Created default SessionValidationScheduler instance of type [org.apache.shiro.session.mgt.ExecutorServiceSessionValidationScheduler].
 INFO [2019-11-12 10:52:39,642] ({qtp89387388-15} AbstractValidatingSessionManager.java[enableSessionValidation]:233) - Enabling session validation scheduler...
TRACE [2019-11-12 10:52:39,652] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@43a8a120
DEBUG [2019-11-12 10:52:39,652] ({qtp89387388-15} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [44e0ac48-17f3-481c-bf26-4f0c2e46f165]
DEBUG [2019-11-12 10:52:39,653] ({qtp89387388-15} DefaultSecurityManager.java[resolveSession]:452) - Resolved SubjectContext context session is invalid.  Ignoring and creating an anonymous (session-less) Subject instance.
org.apache.shiro.session.UnknownSessionException: There is no session with id [44e0ac48-17f3-481c-bf26-4f0c2e46f165]
at org.apache.shiro.session.mgt.eis.AbstractSessionDAO.readSession(AbstractSessionDAO.java:170)
at org.apache.shiro.session.mgt.DefaultSessionManager.retrieveSessionFromDataSource(DefaultSessionManager.java:236)
at org.apache.shiro.session.mgt.DefaultSessionManager.retrieveSession(DefaultSessionManager.java:222)
at org.apache.shiro.session.mgt.AbstractValidatingSessionManager.doGetSession(AbstractValidatingSessionManager.java:118)
at org.apache.shiro.session.mgt.AbstractNativeSessionManager.lookupSession(AbstractNativeSessionManager.java:148)
at org.apache.shiro.session.mgt.AbstractNativeSessionManager.getSession(AbstractNativeSessionManager.java:140)
at org.apache.shiro.mgt.SessionsSecurityManager.getSession(SessionsSecurityManager.java:156)
at org.apache.shiro.mgt.DefaultSecurityManager.resolveContextSession(DefaultSecurityManager.java:461)
at org.apache.shiro.mgt.DefaultSecurityManager.resolveSession(DefaultSecurityManager.java:447)
at org.apache.shiro.mgt.DefaultSecurityManager.createSubject(DefaultSecurityManager.java:343)
at org.apache.shiro.subject.Subject$Builder.buildSubject(Subject.java:845)
at org.apache.shiro.web.subject.WebSubject$Builder.buildWebSubject(WebSubject.java:148)
at org.apache.shiro.web.servlet.AbstractShiroFilter.createSubject(AbstractShiroFilter.java:292)
at org.apache.shiro.web.servlet.AbstractShiroFilter.doFilterInternal(AbstractShiroFilter.java:359)
at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:125)
at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
at org.apache.zeppelin.server.CorsFilter.doFilter(CorsFilter.java:72)
at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540)
at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146)
at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548)
at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1588)
at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1345)
at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480)
at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1557)
at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1247)
at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144)
at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220)
at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
at org.eclipse.jetty.server.Server.handle(Server.java:502)
at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:364)
at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:260)
at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103)
at org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:118)
at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:765)
at org.eclipse.jetty.util.thread.QueuedThreadPool$2.run(QueuedThreadPool.java:683)
at java.lang.Thread.run(Thread.java:748)
TRACE [2019-11-12 10:52:39,658] ({qtp89387388-15} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-12 10:52:39,658] ({qtp89387388-15} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-12 10:52:39,658] ({qtp89387388-15} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-12 10:52:39,663] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,664] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,664] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,666] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,668] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,670] ({qtp89387388-15} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-15]
TRACE [2019-11-12 10:52:39,670] ({qtp89387388-15} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-15]
TRACE [2019-11-12 10:52:39,671] ({qtp89387388-15} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-15]
TRACE [2019-11-12 10:52:39,671] ({qtp89387388-15} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-15]
TRACE [2019-11-12 10:52:39,671] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,674] ({qtp89387388-15} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/security/ticket].  Utilizing corresponding filter chain...
TRACE [2019-11-12 10:52:39,678] ({qtp89387388-15} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-12 10:52:39,678] ({qtp89387388-15} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-12 10:52:39,948] ({qtp89387388-11} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-12 10:52:39,948] ({qtp89387388-11} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-12 10:52:39,949] ({qtp89387388-11} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@316f4993
DEBUG [2019-11-12 10:52:39,950] ({qtp89387388-11} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [44e0ac48-17f3-481c-bf26-4f0c2e46f165]
DEBUG [2019-11-12 10:52:39,951] ({qtp89387388-11} DefaultSecurityManager.java[resolveSession]:452) - Resolved SubjectContext context session is invalid.  Ignoring and creating an anonymous (session-less) Subject instance.
org.apache.shiro.session.UnknownSessionException: There is no session with id [44e0ac48-17f3-481c-bf26-4f0c2e46f165]
at org.apache.shiro.session.mgt.eis.AbstractSessionDAO.readSession(AbstractSessionDAO.java:170)
at org.apache.shiro.session.mgt.DefaultSessionManager.retrieveSessionFromDataSource(DefaultSessionManager.java:236)
at org.apache.shiro.session.mgt.DefaultSessionManager.retrieveSession(DefaultSessionManager.java:222)
at org.apache.shiro.session.mgt.AbstractValidatingSessionManager.doGetSession(AbstractValidatingSessionManager.java:118)
at org.apache.shiro.session.mgt.AbstractNativeSessionManager.lookupSession(AbstractNativeSessionManager.java:148)
at org.apache.shiro.session.mgt.AbstractNativeSessionManager.getSession(AbstractNativeSessionManager.java:140)
at org.apache.shiro.mgt.SessionsSecurityManager.getSession(SessionsSecurityManager.java:156)
at org.apache.shiro.mgt.DefaultSecurityManager.resolveContextSession(DefaultSecurityManager.java:461)
at org.apache.shiro.mgt.DefaultSecurityManager.resolveSession(DefaultSecurityManager.java:447)
at org.apache.shiro.mgt.DefaultSecurityManager.createSubject(DefaultSecurityManager.java:343)
at org.apache.shiro.subject.Subject$Builder.buildSubject(Subject.java:845)
at org.apache.shiro.web.subject.WebSubject$Builder.buildWebSubject(WebSubject.java:148)
at org.apache.shiro.web.servlet.AbstractShiroFilter.createSubject(AbstractShiroFilter.java:292)
at org.apache.shiro.web.servlet.AbstractShiroFilter.doFilterInternal(AbstractShiroFilter.java:359)
at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:125)
at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
at org.apache.zeppelin.server.CorsFilter.doFilter(CorsFilter.java:72)
at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1610)
at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:540)
at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:146)
at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:548)
at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:257)
at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1588)
at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:255)
at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1345)
at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:203)
at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:480)
at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1557)
at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:201)
at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1247)
at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:144)
at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:220)
at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:132)
at org.eclipse.jetty.server.Server.handle(Server.java:502)
at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:364)
at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:260)
at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:305)
at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:103)
at org.eclipse.jetty.io.ChannelEndPoint$2.run(ChannelEndPoint.java:118)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:333)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:310)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:168)
at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.produce(EatWhatYouKill.java:132)
at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:765)
at org.eclipse.jetty.util.thread.QueuedThreadPool$2.run(QueuedThreadPool.java:683)
at java.lang.Thread.run(Thread.java:748)
TRACE [2019-11-12 10:52:39,952] ({qtp89387388-11} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-12 10:52:39,953] ({qtp89387388-11} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-12 10:52:39,954] ({qtp89387388-11} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-12 10:52:39,954] ({qtp89387388-11} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,955] ({qtp89387388-11} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,955] ({qtp89387388-11} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,955] ({qtp89387388-11} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,956] ({qtp89387388-11} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,957] ({qtp89387388-11} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-11]
TRACE [2019-11-12 10:52:39,957] ({qtp89387388-11} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-11]
TRACE [2019-11-12 10:52:39,957] ({qtp89387388-11} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-11]
TRACE [2019-11-12 10:52:39,957] ({qtp89387388-11} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-11]
TRACE [2019-11-12 10:52:39,957] ({qtp89387388-11} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-12 10:52:39,958] ({qtp89387388-11} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/version] for requestURI [/api/version].  Utilizing corresponding filter chain...
TRACE [2019-11-12 10:52:39,958] ({qtp89387388-11} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-12 10:52:39,959] ({qtp89387388-11} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-12 10:52:39,960] ({qtp89387388-11} OncePerRequestFilter.java[doFilter]:121) - Filter 'anon' not yet executed.  Executing now.
TRACE [2019-11-12 10:52:39,960] ({qtp89387388-11} PathMatchingFilter.java[pathsMatch]:123) - Attempting to match pattern '/api/version' with current requestURI '/api/version'...
TRACE [2019-11-12 10:52:39,960] ({qtp89387388-11} PathMatchingFilter.java[preHandle]:176) - Current requestURI matches pattern '/api/version'.  Determining filter chain execution...
TRACE [2019-11-12 10:52:39,961] ({qtp89387388-11} PathMatchingFilter.java[isFilterChainContinued]:197) - Filter 'anon' is enabled for the current request under path '/api/version' with config [null].  Delegating to subclass implementation for 'onPreHandle' check.
TRACE [2019-11-12 10:52:39,961] ({qtp89387388-11} AdviceFilter.java[doFilterInternal]:133) - Invoked preHandle method.  Continuing chain?: [true]
TRACE [2019-11-12 10:52:39,961] ({qtp89387388-11} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-12 10:52:40,090] ({qtp89387388-11} AdviceFilter.java[doFilterInternal]:142) - Successfully invoked postHandle method
TRACE [2019-11-12 10:52:40,091] ({qtp89387388-11} AdviceFilter.java[cleanup]:174) - Successfully invoked afterCompletion method.

Kind regards,
Esirem.
Message has been deleted

Jérôme LELEU

unread,
Nov 12, 2019, 10:44:05 AM11/12/19
to esirem malaysia, Pac4j development mailing list
Hi,

I don't see any obvious issue explaining the error. I guess we should compare these logs to the ones you get with the other working configuration.
Thanks.
Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.

esirem malaysia

unread,
Nov 13, 2019, 5:55:26 AM11/13/19
to Pac4j development mailing list
Hi,

Yes, I was comparing these previous logs to the ones I get with the other working configuration. I found some differences between those logs but could not deeply understand each action. I executed the exact same action on each of those 2 configurations (Oidc and KeycloakOidc) and here the logs (for information both of the configuration are executed without any cookies saved in the Mozilla browser :

1. Oidc configuration logs (WORKING but could not retrieve logs) :
Action : Browse http://localhost:8080/ which is the path to zeppelin. It then automatically redirect to Keycload Authentification (http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration). I enter username and password and I finally have access to a zeppelin logged account. 

INFO [2019-11-13 10:49:16,465] ({main} EnvironmentLoader.java[initEnvironment]:133) - Starting Shiro environment initialization.
TRACE [2019-11-13 10:49:16,532] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [WebAppClassLoader=zeppelin-web@3b07a0d6]
TRACE [2019-11-13 10:49:16,532] ({main} ClassUtils.java[forName]:135) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the thread context ClassLoader.  Trying the current ClassLoader...
TRACE [2019-11-13 10:49:16,533] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
TRACE [2019-11-13 10:49:16,534] ({main} ClassUtils.java[forName]:143) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the current ClassLoader.  Trying the system/application ClassLoader...
TRACE [2019-11-13 10:49:16,535] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
DEBUG [2019-11-13 10:49:16,543] ({main} IniWebEnvironment.java[parseConfig]:95) - Checking any specified config locations.
DEBUG [2019-11-13 10:49:16,544] ({main} ResourceUtils.java[loadFromFile]:147) - Opening file [/home/user/Documents/ZeppelinNonRoot/zeppelin_0.8.2_v2/conf/shiro.ini]...
DEBUG [2019-11-13 10:49:16,549] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-13 10:49:16,559] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: roleAdminAuthGenerator = org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator
TRACE [2019-11-13 10:49:16,560] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig = org.pac4j.oidc.config.OidcConfiguration
TRACE [2019-11-13 10:49:16,560] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.discoveryURI = http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration
TRACE [2019-11-13 10:49:16,561] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientId = zeppelin-client
TRACE [2019-11-13 10:49:16,561] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.secret = 04814074-86aa-43dd-80ec-c9b1977573eb
TRACE [2019-11-13 10:49:16,562] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientAuthenticationMethodAsString = client_secret_basic
TRACE [2019-11-13 10:49:16,562] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.scope = openid
TRACE [2019-11-13 10:49:16,566] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.useNonce = true
TRACE [2019-11-13 10:49:16,566] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.responseType = code
TRACE [2019-11-13 10:49:16,566] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.logoutUrl = http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout
TRACE [2019-11-13 10:49:16,567] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient = org.pac4j.oidc.client.OidcClient
TRACE [2019-11-13 10:49:16,567] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.configuration = $oidcConfig
TRACE [2019-11-13 10:49:16,568] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.authorizationGenerator = $roleAdminAuthGenerator
TRACE [2019-11-13 10:49:16,568] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-13 10:49:16,568] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.callbackUrl = http://localhost:8080/api/callback
TRACE [2019-11-13 10:49:16,569] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.clients = $oidcClient
TRACE [2019-11-13 10:49:16,569] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
TRACE [2019-11-13 10:49:16,569] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin.elements = admin_role
TRACE [2019-11-13 10:49:16,570] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-13 10:49:16,570] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-13 10:49:16,570] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.authorizers = admin:$requireRoleAdmin
TRACE [2019-11-13 10:49:16,571] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-13 10:49:16,571] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm.principalNameAttribute = preferred_username
TRACE [2019-11-13 10:49:16,571] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-13 10:49:16,572] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: sessionManager = org.apache.shiro.web.session.mgt.DefaultWebSessionManager
TRACE [2019-11-13 10:49:16,572] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager = $sessionManager
TRACE [2019-11-13 10:49:16,573] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager.globalSessionTimeout = 86400000
TRACE [2019-11-13 10:49:16,573] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-13 10:49:16,574] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.realms = $pac4jRealm
TRACE [2019-11-13 10:49:16,574] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter = io.buji.pac4j.filter.SecurityFilter
TRACE [2019-11-13 10:49:16,574] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.config = $config
TRACE [2019-11-13 10:49:16,575] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.clients = oidcClient
TRACE [2019-11-13 10:49:16,575] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter = io.buji.pac4j.filter.LogoutFilter
TRACE [2019-11-13 10:49:16,575] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-13 10:49:16,576] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.localLogout = true
TRACE [2019-11-13 10:49:16,576] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.centralLogout = true
TRACE [2019-11-13 10:49:16,576] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.config = $config
TRACE [2019-11-13 10:49:16,576] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-13 10:49:16,577] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-13 10:49:16,577] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
DEBUG [2019-11-13 10:49:16,577] ({main} Ini.java[load]:401) - Parsing [urls]
TRACE [2019-11-13 10:49:16,578] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/version = anon
TRACE [2019-11-13 10:49:16,578] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/callback = callbackFilter
TRACE [2019-11-13 10:49:16,578] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /** = oidcSecurityFilter
TRACE [2019-11-13 10:49:16,579] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/login/logout = logoutFilter
DEBUG [2019-11-13 10:49:16,579] ({main} ResourceUtils.java[loadFromClassPath]:159) - Opening resource from class path [buji-pac4j-default.ini]
DEBUG [2019-11-13 10:49:16,580] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-13 10:49:16,582] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-13 10:49:16,582] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-13 10:49:16,583] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-13 10:49:16,583] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-13 10:49:16,584] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-13 10:49:16,584] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-13 10:49:16,584] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-13 10:49:16,585] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
DEBUG [2019-11-13 10:49:16,587] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-13 10:49:16,705] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
DEBUG [2019-11-13 10:49:16,743] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$clients'.  Looking up object with id 'clients'
TRACE [2019-11-13 10:49:16,744] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [#Clients# | callbackUrl: null | clients: null | ajaxRequestResolver: null | callbackUrlResolver: null | authorizationGenerators: [] | defaultSecurityClients: null | urlResolver: null |] on object of type [org.pac4j.core.config.Config]
DEBUG [2019-11-13 10:49:16,779] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jSubjectFactory'.  Looking up object with id 'pac4jSubjectFactory'
TRACE [2019-11-13 10:49:16,780] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [subjectFactory] value [io.buji.pac4j.subject.Pac4jSubjectFactory@6c779568] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-13 10:49:16,791] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-13 10:49:16,791] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.CallbackFilter]
TRACE [2019-11-13 10:49:16,814] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [discoveryURI] value [http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration] on object of type [org.pac4j.oidc.config.OidcConfiguration]
TRACE [2019-11-13 10:49:16,815] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientId] value [zeppelin-client] on object of type [org.pac4j.oidc.config.OidcConfiguration]
TRACE [2019-11-13 10:49:16,816] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [secret] value [04814074-86aa-43dd-80ec-c9b1977573eb] on object of type [org.pac4j.oidc.config.OidcConfiguration]
TRACE [2019-11-13 10:49:16,816] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientAuthenticationMethodAsString] value [client_secret_basic] on object of type [org.pac4j.oidc.config.OidcConfiguration]
TRACE [2019-11-13 10:49:16,817] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [scope] value [openid] on object of type [org.pac4j.oidc.config.OidcConfiguration]
TRACE [2019-11-13 10:49:16,817] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [useNonce] value [true] on object of type [org.pac4j.oidc.config.OidcConfiguration]
TRACE [2019-11-13 10:49:16,818] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [responseType] value [code] on object of type [org.pac4j.oidc.config.OidcConfiguration]
TRACE [2019-11-13 10:49:16,818] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [logoutUrl] value [http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout] on object of type [org.pac4j.oidc.config.OidcConfiguration]
DEBUG [2019-11-13 10:49:16,838] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcConfig'.  Looking up object with id 'oidcConfig'
TRACE [2019-11-13 10:49:16,839] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [configuration] value [#OidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@693fe6c9 |] on object of type [org.pac4j.oidc.client.OidcClient]
DEBUG [2019-11-13 10:49:16,839] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$roleAdminAuthGenerator'.  Looking up object with id 'roleAdminAuthGenerator'
TRACE [2019-11-13 10:49:16,839] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizationGenerator] value [org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator@34f5090e] on object of type [org.pac4j.oidc.client.OidcClient]
TRACE [2019-11-13 10:49:16,844] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [callbackUrl] value [http://localhost:8080/api/callback] on object of type [org.pac4j.core.client.Clients]
DEBUG [2019-11-13 10:49:16,844] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
DEBUG [2019-11-13 10:49:16,844] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
TRACE [2019-11-13 10:49:16,845] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [[#OidcClient# | name: OidcClient | callbackUrl: null | callbackUrlResolver: null | ajaxRequestResolver: null | redirectActionBuilder: null | credentialsExtractor: null | authenticator: null | profileCreator: org.pac4j.core.profile.creator.AuthenticatorProfileCreator@a2431d0 | logoutActionBuilder: org.pac4j.core.logout.NoLogoutActionBuilder@1cbb87f3 | authorizationGenerators: [org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator@34f5090e] | configuration: #OidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@693fe6c9 | |]] on object of type [org.pac4j.core.client.Clients]
TRACE [2019-11-13 10:49:16,857] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [elements] value [[admin_role]] on object of type [org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer]
DEBUG [2019-11-13 10:49:16,857] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$requireRoleAdmin'.  Looking up object with id 'requireRoleAdmin'
TRACE [2019-11-13 10:49:16,857] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizers] value [{admin=org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer@6c130c45}] on object of type [org.pac4j.core.config.Config]
TRACE [2019-11-13 10:49:16,868] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [principalNameAttribute] value [preferred_username] on object of type [io.buji.pac4j.realm.Pac4jRealm]
DEBUG [2019-11-13 10:49:16,869] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-13 10:49:16,869] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
DEBUG [2019-11-13 10:49:16,871] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$sessionManager'.  Looking up object with id 'sessionManager'
TRACE [2019-11-13 10:49:16,871] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager] value [org.apache.shiro.web.session.mgt.DefaultWebSessionManager@2fd1433e] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
TRACE [2019-11-13 10:49:16,884] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager.globalSessionTimeout] value [86400000] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-13 10:49:16,885] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
DEBUG [2019-11-13 10:49:16,885] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
TRACE [2019-11-13 10:49:16,885] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [realms] value [[io.buji.pac4j.realm.Pac4jRealm@4de4b452]] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-13 10:49:16,902] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-13 10:49:16,902] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-13 10:49:16,903] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [oidcClient] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-13 10:49:16,908] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-13 10:49:16,909] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [localLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-13 10:49:16,909] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [centralLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
DEBUG [2019-11-13 10:49:16,910] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-13 10:49:16,910] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-13 10:49:16,910] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.CallbackFilter]
DEBUG [2019-11-13 10:49:16,911] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-13 10:49:16,911] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
 INFO [2019-11-13 10:49:16,911] ({main} IniSecurityManagerFactory.java[isAutoApplyRealms]:127) - Realms have been explicitly set on the SecurityManager instance - auto-setting of realms will not occur.
DEBUG [2019-11-13 10:49:16,912] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-13 10:49:16,915] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
TRACE [2019-11-13 10:49:16,916] ({main} IniFilterChainResolverFactory.java[createChains]:185) - Before url processing.
DEBUG [2019-11-13 10:49:16,916] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/version] from String definition [anon]
DEBUG [2019-11-13 10:49:16,917] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/version] to filter [anon] with config [null]
DEBUG [2019-11-13 10:49:16,918] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/callback] from String definition [callbackFilter]
DEBUG [2019-11-13 10:49:16,918] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/callback] to filter [io.buji.pac4j.filter.CallbackFilter@611889f4] with config [null]
DEBUG [2019-11-13 10:49:16,918] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/**] from String definition [oidcSecurityFilter]
DEBUG [2019-11-13 10:49:16,919] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/**] to filter [io.buji.pac4j.filter.SecurityFilter@1da2cb77] with config [null]
DEBUG [2019-11-13 10:49:16,919] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/login/logout] from String definition [logoutFilter]
DEBUG [2019-11-13 10:49:16,919] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/login/logout] to filter [io.buji.pac4j.filter.LogoutFilter@48f278eb] with config [null]
DEBUG [2019-11-13 10:49:16,919] ({main} EnvironmentLoader.java[initEnvironment]:142) - Published WebEnvironment as ServletContext attribute with name [org.apache.shiro.web.env.EnvironmentLoader.ENVIRONMENT_ATTRIBUTE_KEY]
 INFO [2019-11-13 10:49:16,919] ({main} EnvironmentLoader.java[initEnvironment]:147) - Shiro environment initialized in 448 ms.
TRACE [2019-11-13 10:49:17,433] ({main} ThreadContext.java[get]:126) - get() - in thread [main]
TRACE [2019-11-13 10:49:51,125] ({qtp89387388-16} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-13 10:49:51,136] ({qtp89387388-16} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
DEBUG [2019-11-13 10:49:51,151] ({qtp89387388-16} AbstractValidatingSessionManager.java[createSessionValidationScheduler]:213) - No sessionValidationScheduler set.  Attempting to create default instance.
TRACE [2019-11-13 10:49:51,161] ({qtp89387388-16} AbstractValidatingSessionManager.java[createSessionValidationScheduler]:218) - Created default SessionValidationScheduler instance of type [org.apache.shiro.session.mgt.ExecutorServiceSessionValidationScheduler].
 INFO [2019-11-13 10:49:51,161] ({qtp89387388-16} AbstractValidatingSessionManager.java[enableSessionValidation]:233) - Enabling session validation scheduler...
TRACE [2019-11-13 10:49:51,174] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@279da14
TRACE [2019-11-13 10:49:51,175] ({qtp89387388-16} SimpleCookie.java[readValue]:392) - No 'JSESSIONID' cookie value
DEBUG [2019-11-13 10:49:51,175] ({qtp89387388-16} DefaultSessionManager.java[retrieveSession]:218) - Unable to resolve session ID from SessionKey [org.apache.shiro.web.session.mgt.WebSessionKey@279da14].  Returning null to indicate a session could not be found.
TRACE [2019-11-13 10:49:51,175] ({qtp89387388-16} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-13 10:49:51,176] ({qtp89387388-16} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-13 10:49:51,176] ({qtp89387388-16} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-13 10:49:51,186] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,187] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,187] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,187] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,187] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,189] ({qtp89387388-16} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,198] ({qtp89387388-16} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,199] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,199] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,199] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,200] ({qtp89387388-16} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/security/ticket].  Utilizing corresponding filter chain...
TRACE [2019-11-13 10:49:51,202] ({qtp89387388-16} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-13 10:49:51,203] ({qtp89387388-16} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-13 10:49:51,221] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,221] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,221] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,483] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,483] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,493] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = true; session has id = false
TRACE [2019-11-13 10:49:51,493] ({qtp89387388-16} DelegatingSubject.java[getSession]:338) - Starting session for host 127.0.0.1
TRACE [2019-11-13 10:49:51,497] ({qtp89387388-16} DefaultSessionManager.java[doCreateSession]:156) - Creating session for host 127.0.0.1
DEBUG [2019-11-13 10:49:51,497] ({qtp89387388-16} DefaultSessionManager.java[create]:175) - Creating new EIS record for new session instance [org.apache.shiro.session.mgt.SimpleSession,id=null]
TRACE [2019-11-13 10:49:51,498] ({qtp89387388-16} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-13 10:49:51,509] ({qtp89387388-16} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [JSESSIONID=c691b65f-48c8-4b8c-bf07-c2d74ce36f42; Path=/; HttpOnly]
TRACE [2019-11-13 10:49:51,509] ({qtp89387388-16} DefaultWebSessionManager.java[storeSessionId]:101) - Set session ID cookie for session with id c691b65f-48c8-4b8c-bf07-c2d74ce36f42
TRACE [2019-11-13 10:49:51,512] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@2e1ff9e0
TRACE [2019-11-13 10:49:51,513] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,513] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,513] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-13 10:49:51,514] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@2e1ff9e0
TRACE [2019-11-13 10:49:51,526] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,527] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-13 10:49:51,527] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:51,527] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@2e1ff9e0
TRACE [2019-11-13 10:49:59,252] ({qtp89387388-58} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-13 10:49:59,253] ({qtp89387388-58} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-13 10:49:59,254] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1200c0d7
DEBUG [2019-11-13 10:49:59,255] ({qtp89387388-58} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [c691b65f-48c8-4b8c-bf07-c2d74ce36f42]
TRACE [2019-11-13 10:49:59,255] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,255] ({qtp89387388-58} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-13 10:49:59,256] ({qtp89387388-58} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-13 10:49:59,256] ({qtp89387388-58} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-13 10:49:59,266] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,266] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,267] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,267] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,267] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,268] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,268] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,268] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,269] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,269] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,269] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,270] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,270] ({qtp89387388-58} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,270] ({qtp89387388-58} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,270] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,270] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,270] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,271] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,271] ({qtp89387388-58} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/callback] for requestURI [/api/callback].  Utilizing corresponding filter chain...
TRACE [2019-11-13 10:49:59,272] ({qtp89387388-58} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-13 10:49:59,272] ({qtp89387388-58} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-13 10:49:59,293] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,293] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,294] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,294] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,370] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,371] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,371] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,371] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,404] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,404] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,404] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,404] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,495] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,495] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,496] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,496] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,496] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,496] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,496] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,496] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,498] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,498] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,498] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,498] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,499] ({qtp89387388-58} AbstractAuthenticator.java[authenticate]:194) - Authentication attempt received for token [io.buji.pac4j.token.Pac4jToken@57965fe9]
DEBUG [2019-11-13 10:49:59,504] ({qtp89387388-58} AuthenticatingRealm.java[getAuthenticationInfo]:572) - Looked up AuthenticationInfo [#Pac4jPrincipal# | profiles: [#OidcProfile# | id: 21e66a5c-2e4f-4354-85fb-ac42cb83ad07 | attributes: {sub=21e66a5c-2e4f-4354-85fb-ac42cb83ad07, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.d9ZQYNsrUWSCHMDObzlARZ2XhMrOwHBTkdROOh3HV5cgW-87IYiEkfXwSw1fmwHPVvPchu-RvpuQVI83B8QfhOsoQo8K9azNr84R0dcRmnpL7ueBSp4WCB4Zrop1btnnxpKHKwCBU8SkO3n7qx5zPROhiWJs_qSopUcX_oMp2i4kB6pz9YQNYVrlAuUrJEoai0NvQ3UZ3aBMpO2DWFzzogKXGuQCxQ3gkqopuZdNYCufus3l_V-5X25xAolsR98uxLJNJcoLFWz_bS_4kTk6x5H6LcGhNKmLnyLhkKWhYEQpqmJ3rMcCnSKKp28WmmLEDZLmsjF0tIq3iRs_JIXuug, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, given_name=esirem, nonce=8dS0CLAZrRamF8crTNwlU4LWQdV9hp7LqzODDL_PGCo, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MY4uJNt4F6GHiOfH_OLhKju6CVZ26U8Aai3WrhH2hf5bhARWRGft5aRhP3q5y06gNUxdIFrWz2p7b-eovJExxmCVS-rAiibz5Boiqnxhw8ECIa1PE-iKoef_v-p2npz2fKLaiJkbYVUIp16R_D8AvwKTIHJWTUsYEnO4NvXw9LnU-Ig388NzfK4gcJRcDcxApxF0pF_RSNQytqz-00Gir-eKSC4fQWTfLJ0M3lkzNqQcIn-s46SLUziq7Q4Gh1Y6lx4WlNI_eTPxfE5a6lXYcbxyIkf-WjN2BrU_Fk1zwMzE2kjOdqQ3L5UtsMdwg5r-c-pqgzIzKMDc1OI0hewmxQ, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.eyJqdGkiOiIzNTE0YTJkZC02ZmNiLTQ0OGYtYmEwYy0zYTVkMWI4NGEwODUiLCJleHAiOjE1NzM2NDAzOTksIm5iZiI6MCwiaWF0IjoxNTczNjM4NTk5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJzdWIiOiIyMWU2NmE1Yy0yZTRmLTQzNTQtODVmYi1hYzQyY2I4M2FkMDciLCJ0eXAiOiJSZWZyZXNoIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiI4ZFMwQ0xBWnJSYW1GOGNyVE53bFU0TFdRZFY5aHA3THF6T0RETF9QR0NvIiwiYXV0aF90aW1lIjowLCJzZXNzaW9uX3N0YXRlIjoiM2JkYWQ5OGQtODIwZi00ZGZkLWI4NWMtMDM2NDEzNzk5MjJjIiwicmVhbG1fYWNjZXNzIjp7InJvbGVzIjpbIm9mZmxpbmVfYWNjZXNzIiwidW1hX2F1dGhvcml6YXRpb24iXX0sInJlc291cmNlX2FjY2VzcyI6eyJ6ZXBwZWxpbi1jbGllbnQiOnsicm9sZXMiOlsidXNlcl9yb2xlIiwidXNlciJdfSwiYWNjb3VudCI6eyJyb2xlcyI6WyJtYW5hZ2UtYWNjb3VudCIsIm1hbmFnZS1hY2NvdW50LWxpbmtzIiwidmlldy1wcm9maWxlIl19fSwic2NvcGUiOiJvcGVuaWQgcHJvZmlsZSBlbWFpbCJ9.CKl-2KrHUPgpAQr7B8eQ-LSCAwYEWEFa47YJk0vAFbo, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Wed Nov 13 10:49:59 CET 2019, name=esirem jerome, exp=Wed Nov 13 10:54:59 CET 2019, session_state=3bdad98d-820f-4dfd-b85c-03641379922c, family_name=jerome, iat=Wed Nov 13 10:49:59 CET 2019, jti=ba729840-11d4-4325-975a-768fe3aaafce} | roles: [] | permissions: [] | isRemembered: false | clientName: OidcClient | linkedId: null |] |] from doGetAuthenticationInfo
DEBUG [2019-11-13 10:49:59,504] ({qtp89387388-58} AuthenticatingRealm.java[cacheAuthenticationInfoIfPossible]:510) - AuthenticationInfo caching is disabled for info [#Pac4jPrincipal# | profiles: [#OidcProfile# | id: 21e66a5c-2e4f-4354-85fb-ac42cb83ad07 | attributes: {sub=21e66a5c-2e4f-4354-85fb-ac42cb83ad07, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.d9ZQYNsrUWSCHMDObzlARZ2XhMrOwHBTkdROOh3HV5cgW-87IYiEkfXwSw1fmwHPVvPchu-RvpuQVI83B8QfhOsoQo8K9azNr84R0dcRmnpL7ueBSp4WCB4Zrop1btnnxpKHKwCBU8SkO3n7qx5zPROhiWJs_qSopUcX_oMp2i4kB6pz9YQNYVrlAuUrJEoai0NvQ3UZ3aBMpO2DWFzzogKXGuQCxQ3gkqopuZdNYCufus3l_V-5X25xAolsR98uxLJNJcoLFWz_bS_4kTk6x5H6LcGhNKmLnyLhkKWhYEQpqmJ3rMcCnSKKp28WmmLEDZLmsjF0tIq3iRs_JIXuug, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, given_name=esirem, nonce=8dS0CLAZrRamF8crTNwlU4LWQdV9hp7LqzODDL_PGCo, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MY4uJNt4F6GHiOfH_OLhKju6CVZ26U8Aai3WrhH2hf5bhARWRGft5aRhP3q5y06gNUxdIFrWz2p7b-eovJExxmCVS-rAiibz5Boiqnxhw8ECIa1PE-iKoef_v-p2npz2fKLaiJkbYVUIp16R_D8AvwKTIHJWTUsYEnO4NvXw9LnU-Ig388NzfK4gcJRcDcxApxF0pF_RSNQytqz-00Gir-eKSC4fQWTfLJ0M3lkzNqQcIn-s46SLUziq7Q4Gh1Y6lx4WlNI_eTPxfE5a6lXYcbxyIkf-WjN2BrU_Fk1zwMzE2kjOdqQ3L5UtsMdwg5r-c-pqgzIzKMDc1OI0hewmxQ, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.eyJqdGkiOiIzNTE0YTJkZC02ZmNiLTQ0OGYtYmEwYy0zYTVkMWI4NGEwODUiLCJleHAiOjE1NzM2NDAzOTksIm5iZiI6MCwiaWF0IjoxNTczNjM4NTk5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJzdWIiOiIyMWU2NmE1Yy0yZTRmLTQzNTQtODVmYi1hYzQyY2I4M2FkMDciLCJ0eXAiOiJSZWZyZXNoIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiI4ZFMwQ0xBWnJSYW1GOGNyVE53bFU0TFdRZFY5aHA3THF6T0RETF9QR0NvIiwiYXV0aF90aW1lIjowLCJzZXNzaW9uX3N0YXRlIjoiM2JkYWQ5OGQtODIwZi00ZGZkLWI4NWMtMDM2NDEzNzk5MjJjIiwicmVhbG1fYWNjZXNzIjp7InJvbGVzIjpbIm9mZmxpbmVfYWNjZXNzIiwidW1hX2F1dGhvcml6YXRpb24iXX0sInJlc291cmNlX2FjY2VzcyI6eyJ6ZXBwZWxpbi1jbGllbnQiOnsicm9sZXMiOlsidXNlcl9yb2xlIiwidXNlciJdfSwiYWNjb3VudCI6eyJyb2xlcyI6WyJtYW5hZ2UtYWNjb3VudCIsIm1hbmFnZS1hY2NvdW50LWxpbmtzIiwidmlldy1wcm9maWxlIl19fSwic2NvcGUiOiJvcGVuaWQgcHJvZmlsZSBlbWFpbCJ9.CKl-2KrHUPgpAQr7B8eQ-LSCAwYEWEFa47YJk0vAFbo, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Wed Nov 13 10:49:59 CET 2019, name=esirem jerome, exp=Wed Nov 13 10:54:59 CET 2019, session_state=3bdad98d-820f-4dfd-b85c-03641379922c, family_name=jerome, iat=Wed Nov 13 10:49:59 CET 2019, jti=ba729840-11d4-4325-975a-768fe3aaafce} | roles: [] | permissions: [] | isRemembered: false | clientName: OidcClient | linkedId: null |] |].  Submitted token: [io.buji.pac4j.token.Pac4jToken@57965fe9].
DEBUG [2019-11-13 10:49:59,504] ({qtp89387388-58} SimpleCredentialsMatcher.java[equals]:96) - Performing credentials equality check for tokenCredentials of type [java.lang.Integer and accountCredentials of type [java.lang.Integer]
DEBUG [2019-11-13 10:49:59,505] ({qtp89387388-58} AbstractAuthenticator.java[authenticate]:233) - Authentication successful for token [io.buji.pac4j.token.Pac4jToken@57965fe9].  Returned account [#Pac4jPrincipal# | profiles: [#OidcProfile# | id: 21e66a5c-2e4f-4354-85fb-ac42cb83ad07 | attributes: {sub=21e66a5c-2e4f-4354-85fb-ac42cb83ad07, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.d9ZQYNsrUWSCHMDObzlARZ2XhMrOwHBTkdROOh3HV5cgW-87IYiEkfXwSw1fmwHPVvPchu-RvpuQVI83B8QfhOsoQo8K9azNr84R0dcRmnpL7ueBSp4WCB4Zrop1btnnxpKHKwCBU8SkO3n7qx5zPROhiWJs_qSopUcX_oMp2i4kB6pz9YQNYVrlAuUrJEoai0NvQ3UZ3aBMpO2DWFzzogKXGuQCxQ3gkqopuZdNYCufus3l_V-5X25xAolsR98uxLJNJcoLFWz_bS_4kTk6x5H6LcGhNKmLnyLhkKWhYEQpqmJ3rMcCnSKKp28WmmLEDZLmsjF0tIq3iRs_JIXuug, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, given_name=esirem, nonce=8dS0CLAZrRamF8crTNwlU4LWQdV9hp7LqzODDL_PGCo, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MY4uJNt4F6GHiOfH_OLhKju6CVZ26U8Aai3WrhH2hf5bhARWRGft5aRhP3q5y06gNUxdIFrWz2p7b-eovJExxmCVS-rAiibz5Boiqnxhw8ECIa1PE-iKoef_v-p2npz2fKLaiJkbYVUIp16R_D8AvwKTIHJWTUsYEnO4NvXw9LnU-Ig388NzfK4gcJRcDcxApxF0pF_RSNQytqz-00Gir-eKSC4fQWTfLJ0M3lkzNqQcIn-s46SLUziq7Q4Gh1Y6lx4WlNI_eTPxfE5a6lXYcbxyIkf-WjN2BrU_Fk1zwMzE2kjOdqQ3L5UtsMdwg5r-c-pqgzIzKMDc1OI0hewmxQ, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.CKl-2KrHUPgpAQr7B8eQ-LSCAwYEWEFa47YJk0vAFbo, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Wed Nov 13 10:49:59 CET 2019, name=esirem jerome, exp=Wed Nov 13 10:54:59 CET 2019, session_state=3bdad98d-820f-4dfd-b85c-03641379922c, family_name=jerome, iat=Wed Nov 13 10:49:59 CET 2019, jti=ba729840-11d4-4325-975a-768fe3aaafce} | roles: [] | permissions: [] | isRemembered: false | clientName: OidcClient | linkedId: null |] |]
TRACE [2019-11-13 10:49:59,505] ({qtp89387388-58} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-13 10:49:59,505] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
DEBUG [2019-11-13 10:49:59,505] ({qtp89387388-58} DefaultSecurityManager.java[resolveSession]:441) - Context already contains a session.  Returning.
TRACE [2019-11-13 10:49:59,505] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,506] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,506] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,506] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,506] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,506] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,507] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,507] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,507] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,507] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,507] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,508] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,508] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:49:59,508] ({qtp89387388-58} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-13 10:49:59,509] ({qtp89387388-58} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [rememberMe=deleteMe; Path=/; Max-Age=0; Expires=Tue, 12-Nov-2019 09:49:59 GMT]
TRACE [2019-11-13 10:49:59,509] ({qtp89387388-58} SimpleCookie.java[removeFrom]:375) - Removed 'rememberMe' cookie by setting maxAge=0
DEBUG [2019-11-13 10:49:59,509] ({qtp89387388-58} AbstractRememberMeManager.java[onSuccessfulLogin]:290) - AuthenticationToken did not indicate RememberMe is requested.  RememberMe functionality will not be executed for corresponding account.
TRACE [2019-11-13 10:49:59,510] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,510] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,510] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:49:59,511] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:49:59,511] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1cc72ce7
TRACE [2019-11-13 10:50:00,810] ({qtp89387388-58} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-13 10:50:00,811] ({qtp89387388-58} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-13 10:50:00,811] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@66d28ae6
DEBUG [2019-11-13 10:50:00,811] ({qtp89387388-58} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [c691b65f-48c8-4b8c-bf07-c2d74ce36f42]
TRACE [2019-11-13 10:50:00,811] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,812] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,812] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,812] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,812] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,812] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,812] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,813] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,813] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,814] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,814] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,814] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,814] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,814] ({qtp89387388-58} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,822] ({qtp89387388-58} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,823] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,823] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,823] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,823] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,823] ({qtp89387388-58} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/security/ticket].  Utilizing corresponding filter chain...
TRACE [2019-11-13 10:50:00,824] ({qtp89387388-58} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-13 10:50:00,824] ({qtp89387388-58} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-13 10:50:00,824] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,824] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,824] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,828] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,828] ({qtp89387388-58} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-13 10:50:00,972] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,972] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,973] ({qtp89387388-58} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:00,973] ({qtp89387388-58} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@39d145d2
TRACE [2019-11-13 10:50:00,980] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,981] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,981] ({qtp89387388-58} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-58]
TRACE [2019-11-13 10:50:00,982] ({qtp89387388-58} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] bound to thread [qtp89387388-58]
TRACE [2019-11-13 10:50:01,404] ({qtp89387388-15} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-13 10:50:01,405] ({qtp89387388-15} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-13 10:50:01,405] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1110d918
DEBUG [2019-11-13 10:50:01,406] ({qtp89387388-15} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [c691b65f-48c8-4b8c-bf07-c2d74ce36f42]
TRACE [2019-11-13 10:50:01,406] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,406] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,407] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,407] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,407] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:01,407] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:01,408] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,408] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:01,408] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,409] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:01,409] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,409] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:01,409] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,410] ({qtp89387388-15} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-15]
TRACE [2019-11-13 10:50:01,410] ({qtp89387388-15} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-15]
TRACE [2019-11-13 10:50:01,410] ({qtp89387388-15} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-15]
TRACE [2019-11-13 10:50:01,410] ({qtp89387388-15} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-15]
TRACE [2019-11-13 10:50:01,410] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-13 10:50:01,410] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@37f9f504
TRACE [2019-11-13 10:50:01,411] ({qtp89387388-15} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/version] for requestURI [/api/version].  Utilizing corresponding filter chain...
TRACE [2019-11-13 10:50:01,411] ({qtp89387388-15} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-13 10:50:01,411] ({qtp89387388-15} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-13 10:50:01,411] ({qtp89387388-15} OncePerRequestFilter.java[doFilter]:121) - Filter 'anon' not yet executed.  Executing now.
TRACE [2019-11-13 10:50:01,411] ({qtp89387388-15} PathMatchingFilter.java[pathsMatch]:123) - Attempting to match pattern '/api/version' with current requestURI '/api/version'...
TRACE [2019-11-13 10:50:01,412] ({qtp89387388-15} PathMatchingFilter.java[preHandle]:176) - Current requestURI matches pattern '/api/version'.  Determining filter chain execution...
TRACE [2019-11-13 10:50:01,412] ({qtp89387388-15} PathMatchingFilter.java[isFilterChainContinued]:197) - Filter 'anon' is enabled for the current request under path '/api/version' with config [null].  Delegating to subclass implementation for 'onPreHandle' check.
TRACE [2019-11-13 10:50:01,412] ({qtp89387388-15} AdviceFilter.java[doFilterInternal]:133) - Invoked preHandle method.  Continuing chain?: [true]
TRACE [2019-11-13 10:50:01,412] ({qtp89387388-15} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-13 10:50:01,431] ({qtp89387388-15} AdviceFilter.java[doFilterInternal]:142) - Successfully invoked postHandle method
TRACE [2019-11-13 10:50:01,431] ({qtp89387388-15} AdviceFilter.java[cleanup]:174) - Successfully invoked afterCompletion method.


2. KeycloacOidc configuration logs (FAILLING) :
Action : Browse http://localhost:8080/ which is the path to zeppelin. There is no redirection to Keycloak Authentification, it is stuck on a non-logged zeppelin interface page where there is no possibility of login, and so nothing happens.

 INFO [2019-11-13 10:39:43,931] ({main} EnvironmentLoader.java[initEnvironment]:133) - Starting Shiro environment initialization.
TRACE [2019-11-13 10:39:43,997] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [WebAppClassLoader=zeppelin-web@3b07a0d6]
TRACE [2019-11-13 10:39:43,998] ({main} ClassUtils.java[forName]:135) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the thread context ClassLoader.  Trying the current ClassLoader...
TRACE [2019-11-13 10:39:43,999] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
TRACE [2019-11-13 10:39:44,000] ({main} ClassUtils.java[forName]:143) - Unable to load class named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from the current ClassLoader.  Trying the system/application ClassLoader...
TRACE [2019-11-13 10:39:44,001] ({main} ClassUtils.java[loadClass]:258) - Unable to load clazz named [org.apache.commons.configuration2.interpol.ConfigurationInterpolator] from class loader [sun.misc.Launcher$AppClassLoader@2b71fc7e]
DEBUG [2019-11-13 10:39:44,014] ({main} IniWebEnvironment.java[parseConfig]:95) - Checking any specified config locations.
DEBUG [2019-11-13 10:39:44,019] ({main} ResourceUtils.java[loadFromFile]:147) - Opening file [/home/user/Documents/ZeppelinNonRoot/zeppelin_0.8.2_v2/conf/shiro.ini]...
DEBUG [2019-11-13 10:39:44,028] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-13 10:39:44,041] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: roleAdminAuthGenerator = org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator
TRACE [2019-11-13 10:39:44,041] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig = org.pac4j.oidc.config.KeycloakOidcConfiguration
TRACE [2019-11-13 10:39:44,042] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.baseUri = http://localhost:5000/auth
TRACE [2019-11-13 10:39:44,042] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientId = zeppelin-client
TRACE [2019-11-13 10:39:44,043] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.secret = 04814074-86aa-43dd-80ec-c9b1977573eb
TRACE [2019-11-13 10:39:44,043] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.realm = zeppelin
TRACE [2019-11-13 10:39:44,044] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.clientAuthenticationMethodAsString = client_secret_basic
TRACE [2019-11-13 10:39:44,048] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.scope = openid
TRACE [2019-11-13 10:39:44,049] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.useNonce = true
TRACE [2019-11-13 10:39:44,050] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.responseType = code
TRACE [2019-11-13 10:39:44,050] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcConfig.logoutUrl = http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout
TRACE [2019-11-13 10:39:44,050] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient = org.pac4j.oidc.client.KeycloakOidcClient
TRACE [2019-11-13 10:39:44,051] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.configuration = $oidcConfig
TRACE [2019-11-13 10:39:44,051] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcClient.authorizationGenerator = $roleAdminAuthGenerator
TRACE [2019-11-13 10:39:44,051] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-13 10:39:44,052] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.callbackUrl = http://localhost:8080/api/callback
TRACE [2019-11-13 10:39:44,052] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients.clients = $oidcClient
TRACE [2019-11-13 10:39:44,053] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
TRACE [2019-11-13 10:39:44,053] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: requireRoleAdmin.elements = admin_role
TRACE [2019-11-13 10:39:44,053] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-13 10:39:44,054] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-13 10:39:44,054] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.authorizers = admin:$requireRoleAdmin
TRACE [2019-11-13 10:39:44,055] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-13 10:39:44,055] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm.principalNameAttribute = preferred_username
TRACE [2019-11-13 10:39:44,055] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-13 10:39:44,055] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: sessionManager = org.apache.shiro.web.session.mgt.DefaultWebSessionManager
TRACE [2019-11-13 10:39:44,056] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager = $sessionManager
TRACE [2019-11-13 10:39:44,056] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.sessionManager.globalSessionTimeout = 86400000
TRACE [2019-11-13 10:39:44,057] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-13 10:39:44,057] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.realms = $pac4jRealm
TRACE [2019-11-13 10:39:44,057] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter = io.buji.pac4j.filter.SecurityFilter
TRACE [2019-11-13 10:39:44,058] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.config = $config
TRACE [2019-11-13 10:39:44,058] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: oidcSecurityFilter.clients = oidcClient
TRACE [2019-11-13 10:39:44,058] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter = io.buji.pac4j.filter.LogoutFilter
TRACE [2019-11-13 10:39:44,059] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-13 10:39:44,059] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.localLogout = true
TRACE [2019-11-13 10:39:44,059] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.centralLogout = true
TRACE [2019-11-13 10:39:44,059] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: logoutFilter.config = $config
TRACE [2019-11-13 10:39:44,060] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-13 10:39:44,060] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.defaultUrl = http://localhost:8080
TRACE [2019-11-13 10:39:44,061] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
DEBUG [2019-11-13 10:39:44,061] ({main} Ini.java[load]:401) - Parsing [urls]
TRACE [2019-11-13 10:39:44,062] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/version = anon
TRACE [2019-11-13 10:39:44,062] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/callback = callbackFilter
TRACE [2019-11-13 10:39:44,062] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /** = oidcSecurityFilter
TRACE [2019-11-13 10:39:44,063] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: /api/login/logout = logoutFilter
DEBUG [2019-11-13 10:39:44,063] ({main} ResourceUtils.java[loadFromClassPath]:159) - Opening resource from class path [buji-pac4j-default.ini]
DEBUG [2019-11-13 10:39:44,065] ({main} Ini.java[load]:401) - Parsing [main]
TRACE [2019-11-13 10:39:44,066] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: clients = org.pac4j.core.client.Clients
TRACE [2019-11-13 10:39:44,066] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config = org.pac4j.core.config.Config
TRACE [2019-11-13 10:39:44,067] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: config.clients = $clients
TRACE [2019-11-13 10:39:44,067] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
TRACE [2019-11-13 10:39:44,068] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory
TRACE [2019-11-13 10:39:44,068] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: securityManager.subjectFactory = $pac4jSubjectFactory
TRACE [2019-11-13 10:39:44,068] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter = io.buji.pac4j.filter.CallbackFilter
TRACE [2019-11-13 10:39:44,069] ({main} Ini.java[splitKeyValue]:604) - Discovered key/value pair: callbackFilter.config = $config
DEBUG [2019-11-13 10:39:44,071] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-13 10:39:44,197] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
DEBUG [2019-11-13 10:39:44,236] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$clients'.  Looking up object with id 'clients'
TRACE [2019-11-13 10:39:44,238] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [#Clients# | callbackUrl: null | clients: null | ajaxRequestResolver: null | callbackUrlResolver: null | authorizationGenerators: [] | defaultSecurityClients: null | urlResolver: null |] on object of type [org.pac4j.core.config.Config]
DEBUG [2019-11-13 10:39:44,273] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jSubjectFactory'.  Looking up object with id 'pac4jSubjectFactory'
TRACE [2019-11-13 10:39:44,273] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [subjectFactory] value [io.buji.pac4j.subject.Pac4jSubjectFactory@6c779568] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-13 10:39:44,286] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-13 10:39:44,286] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.CallbackFilter]
TRACE [2019-11-13 10:39:44,317] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [baseUri] value [http://localhost:5000/auth] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,317] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientId] value [zeppelin-client] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,318] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [secret] value [04814074-86aa-43dd-80ec-c9b1977573eb] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,318] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [realm] value [zeppelin] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,319] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clientAuthenticationMethodAsString] value [client_secret_basic] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,320] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [scope] value [openid] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,320] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [useNonce] value [true] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,321] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [responseType] value [code] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
TRACE [2019-11-13 10:39:44,322] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [logoutUrl] value [http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout] on object of type [org.pac4j.oidc.config.KeycloakOidcConfiguration]
DEBUG [2019-11-13 10:39:44,349] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcConfig'.  Looking up object with id 'oidcConfig'
TRACE [2019-11-13 10:39:44,349] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [configuration] value [#KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 |] on object of type [org.pac4j.oidc.client.KeycloakOidcClient]
DEBUG [2019-11-13 10:39:44,350] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$roleAdminAuthGenerator'.  Looking up object with id 'roleAdminAuthGenerator'
TRACE [2019-11-13 10:39:44,350] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizationGenerator] value [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7] on object of type [org.pac4j.oidc.client.KeycloakOidcClient]
TRACE [2019-11-13 10:39:44,355] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [callbackUrl] value [http://localhost:8080/api/callback] on object of type [org.pac4j.core.client.Clients]
DEBUG [2019-11-13 10:39:44,356] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
DEBUG [2019-11-13 10:39:44,356] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$oidcClient'.  Looking up object with id 'oidcClient'
TRACE [2019-11-13 10:39:44,356] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [[#KeycloakOidcClient# | name: KeycloakOidcClient | callbackUrl: null | callbackUrlResolver: null | ajaxRequestResolver: null | redirectActionBuilder: null | credentialsExtractor: null | authenticator: null | profileCreator: org.pac4j.core.profile.creator.AuthenticatorProfileCreator@193f604a | logoutActionBuilder: org.pac4j.core.logout.NoLogoutActionBuilder@20f5239f | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |]] on object of type [org.pac4j.core.client.Clients]
TRACE [2019-11-13 10:39:44,370] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [elements] value [[admin_role]] on object of type [org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer]
DEBUG [2019-11-13 10:39:44,371] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$requireRoleAdmin'.  Looking up object with id 'requireRoleAdmin'
TRACE [2019-11-13 10:39:44,371] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [authorizers] value [{admin=org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer@33990a0c}] on object of type [org.pac4j.core.config.Config]
TRACE [2019-11-13 10:39:44,383] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [principalNameAttribute] value [preferred_username] on object of type [io.buji.pac4j.realm.Pac4jRealm]
DEBUG [2019-11-13 10:39:44,384] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-13 10:39:44,384] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
DEBUG [2019-11-13 10:39:44,386] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$sessionManager'.  Looking up object with id 'sessionManager'
TRACE [2019-11-13 10:39:44,386] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager] value [org.apache.shiro.web.session.mgt.DefaultWebSessionManager@ea6147e] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
TRACE [2019-11-13 10:39:44,400] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [sessionManager.globalSessionTimeout] value [86400000] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-13 10:39:44,401] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
DEBUG [2019-11-13 10:39:44,401] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$pac4jRealm'.  Looking up object with id 'pac4jRealm'
TRACE [2019-11-13 10:39:44,402] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [realms] value [[io.buji.pac4j.realm.Pac4jRealm@6f46426d]] on object of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager]
DEBUG [2019-11-13 10:39:44,419] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-13 10:39:44,419] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-13 10:39:44,419] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [clients] value [oidcClient] on object of type [io.buji.pac4j.filter.SecurityFilter]
TRACE [2019-11-13 10:39:44,424] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-13 10:39:44,424] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [localLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-13 10:39:44,425] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [centralLogout] value [true] on object of type [io.buji.pac4j.filter.LogoutFilter]
DEBUG [2019-11-13 10:39:44,425] ({main} ReflectionBuilder.java[resolveReference]:414) - Encountered object reference '$config'.  Looking up object with id 'config'
TRACE [2019-11-13 10:39:44,425] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [config] value [org.pac4j.core.config.Config@482bce4f] on object of type [io.buji.pac4j.filter.LogoutFilter]
TRACE [2019-11-13 10:39:44,426] ({main} ReflectionBuilder.java[setProperty]:665) - Applying property [defaultUrl] value [http://localhost:8080] on object of type [io.buji.pac4j.filter.CallbackFilter]
DEBUG [2019-11-13 10:39:44,426] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-13 10:39:44,426] ({main} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
 INFO [2019-11-13 10:39:44,426] ({main} IniSecurityManagerFactory.java[isAutoApplyRealms]:127) - Realms have been explicitly set on the SecurityManager instance - auto-setting of realms will not occur.
DEBUG [2019-11-13 10:39:44,428] ({main} IniFactorySupport.java[createInstance]:149) - Creating instance from Ini [sections=main,urls]
TRACE [2019-11-13 10:39:44,431] ({main} FormAuthenticationFilter.java[setLoginUrl]:89) - Adding login url to applied paths.
TRACE [2019-11-13 10:39:44,433] ({main} IniFilterChainResolverFactory.java[createChains]:185) - Before url processing.
DEBUG [2019-11-13 10:39:44,434] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/version] from String definition [anon]
DEBUG [2019-11-13 10:39:44,434] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/version] to filter [anon] with config [null]
DEBUG [2019-11-13 10:39:44,435] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/callback] from String definition [callbackFilter]
DEBUG [2019-11-13 10:39:44,436] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/callback] to filter [io.buji.pac4j.filter.CallbackFilter@5d7148e2] with config [null]
DEBUG [2019-11-13 10:39:44,436] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/**] from String definition [oidcSecurityFilter]
DEBUG [2019-11-13 10:39:44,436] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/**] to filter [io.buji.pac4j.filter.SecurityFilter@25fb8912] with config [null]
DEBUG [2019-11-13 10:39:44,436] ({main} DefaultFilterChainManager.java[createChain]:127) - Creating chain [/api/login/logout] from String definition [logoutFilter]
DEBUG [2019-11-13 10:39:44,436] ({main} DefaultFilterChainManager.java[applyChainConfig]:278) - Attempting to apply path [/api/login/logout] to filter [io.buji.pac4j.filter.LogoutFilter@7c24b813] with config [null]
DEBUG [2019-11-13 10:39:44,437] ({main} EnvironmentLoader.java[initEnvironment]:142) - Published WebEnvironment as ServletContext attribute with name [org.apache.shiro.web.env.EnvironmentLoader.ENVIRONMENT_ATTRIBUTE_KEY]
 INFO [2019-11-13 10:39:44,437] ({main} EnvironmentLoader.java[initEnvironment]:147) - Shiro environment initialized in 501 ms.
TRACE [2019-11-13 10:39:44,965] ({main} ThreadContext.java[get]:126) - get() - in thread [main]
TRACE [2019-11-13 10:40:40,693] ({qtp89387388-16} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-13 10:40:40,718] ({qtp89387388-16} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
DEBUG [2019-11-13 10:40:40,719] ({qtp89387388-16} AbstractValidatingSessionManager.java[createSessionValidationScheduler]:213) - No sessionValidationScheduler set.  Attempting to create default instance.
TRACE [2019-11-13 10:40:40,721] ({qtp89387388-16} AbstractValidatingSessionManager.java[createSessionValidationScheduler]:218) - Created default SessionValidationScheduler instance of type [org.apache.shiro.session.mgt.ExecutorServiceSessionValidationScheduler].
 INFO [2019-11-13 10:40:40,723] ({qtp89387388-16} AbstractValidatingSessionManager.java[enableSessionValidation]:233) - Enabling session validation scheduler...
TRACE [2019-11-13 10:40:40,730] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@365dc3b8
TRACE [2019-11-13 10:40:40,731] ({qtp89387388-16} SimpleCookie.java[readValue]:392) - No 'JSESSIONID' cookie value
DEBUG [2019-11-13 10:40:40,731] ({qtp89387388-16} DefaultSessionManager.java[retrieveSession]:218) - Unable to resolve session ID from SessionKey [org.apache.shiro.web.session.mgt.WebSessionKey@365dc3b8].  Returning null to indicate a session could not be found.
TRACE [2019-11-13 10:40:40,732] ({qtp89387388-16} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-13 10:40:40,732] ({qtp89387388-16} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-13 10:40:40,732] ({qtp89387388-16} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-13 10:40:40,737] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:40,737] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:40,739] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:40,739] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:40,739] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:40,741] ({qtp89387388-16} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-16]
TRACE [2019-11-13 10:40:40,742] ({qtp89387388-16} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-16]
TRACE [2019-11-13 10:40:40,742] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-13 10:40:40,742] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-13 10:40:40,742] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:40,743] ({qtp89387388-16} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/security/ticket].  Utilizing corresponding filter chain...
TRACE [2019-11-13 10:40:40,745] ({qtp89387388-16} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-13 10:40:40,745] ({qtp89387388-16} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-13 10:40:41,172] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-13 10:40:41,178] ({qtp89387388-13} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-13 10:40:41,179] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@606c5ceb
TRACE [2019-11-13 10:40:41,179] ({qtp89387388-13} SimpleCookie.java[readValue]:392) - No 'JSESSIONID' cookie value
DEBUG [2019-11-13 10:40:41,179] ({qtp89387388-13} DefaultSessionManager.java[retrieveSession]:218) - Unable to resolve session ID from SessionKey [org.apache.shiro.web.session.mgt.WebSessionKey@606c5ceb].  Returning null to indicate a session could not be found.
TRACE [2019-11-13 10:40:41,180] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-13 10:40:41,180] ({qtp89387388-13} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-13 10:40:41,180] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-13 10:40:41,180] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:41,181] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:41,181] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:41,181] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:41,181] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:41,182] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-13]
TRACE [2019-11-13 10:40:41,182] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-13]
TRACE [2019-11-13 10:40:41,182] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-13 10:40:41,182] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-13 10:40:41,182] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-13 10:40:41,183] ({qtp89387388-13} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/version] for requestURI [/api/version].  Utilizing corresponding filter chain...
TRACE [2019-11-13 10:40:41,187] ({qtp89387388-13} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-13 10:40:41,189] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-13 10:40:41,192] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'anon' not yet executed.  Executing now.
TRACE [2019-11-13 10:40:41,192] ({qtp89387388-13} PathMatchingFilter.java[pathsMatch]:123) - Attempting to match pattern '/api/version' with current requestURI '/api/version'...
TRACE [2019-11-13 10:40:41,193] ({qtp89387388-13} PathMatchingFilter.java[preHandle]:176) - Current requestURI matches pattern '/api/version'.  Determining filter chain execution...
TRACE [2019-11-13 10:40:41,193] ({qtp89387388-13} PathMatchingFilter.java[isFilterChainContinued]:197) - Filter 'anon' is enabled for the current request under path '/api/version' with config [null].  Delegating to subclass implementation for 'onPreHandle' check.
TRACE [2019-11-13 10:40:41,193] ({qtp89387388-13} AdviceFilter.java[doFilterInternal]:133) - Invoked preHandle method.  Continuing chain?: [true]
TRACE [2019-11-13 10:40:41,193] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-13 10:40:41,300] ({qtp89387388-13} AdviceFilter.java[doFilterInternal]:142) - Successfully invoked postHandle method
TRACE [2019-11-13 10:40:41,301] ({qtp89387388-13} AdviceFilter.java[cleanup]:174) - Successfully invoked afterCompletion method.


So finally, those logs seems to be different. Looking deeply inside pac4j-oidc/src/main/java/org/pac4j/oidc/client/KeycloakOidcClient.java and pac4j-oidc/src/main/java/org/pac4j/oidc/client/OidcClient.java. I find that you are overriding clientInit() method but calling it back with super.clientInit();in KeycloakOidcClient.java.  So I am guessing that something went wrong by calling this line defaultRedirectionActionBuilder(new OidcRedirectionActionBuilder(configuration, this));  and so the reason why nothing happening on the second configuration when browsing to zeppelin. It can also come from my configuration which are actually the same white Oidc or KeycloakOidc, can you tell me if I have to specify more parameters with KeycloacOidc configuration ?

I give you previously on the discussion, both of the configuration (shiro.ini), and now there logs. Hope those outputs can help you and me to understand the actual problem.

Best regards,
E.M
...

Jérôme LELEU

unread,
Nov 13, 2019, 7:40:52 AM11/13/19
to esirem malaysia, Pac4j development mailing list
Hi,

Your KeycloakOidcConfiguration seems correct. Even if we have a bug in the Keycloak support, at least, the login process should be triggered. This is strange.

Thanks for the logs, but I also need the org.pac4j package to be at the TRACE level to see what's going on internally in pac4j and not only in Shiro/buji-pac4j?

Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.

esirem

unread,
Nov 13, 2019, 12:08:44 PM11/13/19
to Pac4j development mailing list
Hi Jérôme, 

Following your advice, attached are the specific DEBUG logs for org.pac4j and io.buji for the 2 configurations described before (Oidc and KeycloakOidc). Logs for org.apache.shiro remains the same as above. I have started the server and tried to enter in zeppelin : 
- with the oidc configuration I was redirected to Keycloak login page, after entering credentials I had full access to Zeppelin, I was also able to logout.
- with the keycloakoidc configuration, I was stucked into non-logged Zeppelin interface (no access to dashboard).


1. Oidc configuration logs (WORKING but could not retrieve roles) :
Action : Browse http://localhost:8080/ which is the path to zeppelin. It then automatically redirect to Keycload Authentification (http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration). I enter username and password and I finally have access to a zeppelin logged account. I log out after.

____________________________________________________BEFORE KEYCLOAK AUTHENTIFICATION____________________________________________________

DEBUG [2019-11-13 17:18:53,586] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-13 17:18:53,590] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/security/ticket
DEBUG [2019-11-13 17:18:53,593] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-13 17:18:53,596] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:95) - clients: oidcClient
DEBUG [2019-11-13 17:18:53,600] ({qtp89387388-16} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: oidcClient
DEBUG [2019-11-13 17:18:53,600] ({qtp89387388-16} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-13 17:18:53,601] ({qtp89387388-16} DefaultSecurityClientFinder.java[find]:79) - result: [OidcClient]
DEBUG [2019-11-13 17:18:53,601] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:97) - currentClients: [#OidcClient# | name: OidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: null | ajaxRequestResolver: null | redirectActionBuilder: null | credentialsExtractor: null | authenticator: null | profileCreator: org.pac4j.core.profile.creator.AuthenticatorProfileCreator@e54fb56 | logoutActionBuilder: org.pac4j.core.logout.NoLogoutActionBuilder@7eda973b | authorizationGenerators: [org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator@26dbb986] | configuration: #OidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: null | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@58d02ea3 | |]
DEBUG [2019-11-13 17:18:53,601] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
DEBUG [2019-11-13 17:18:53,605] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:103) - profiles: []
DEBUG [2019-11-13 17:18:53,606] ({qtp89387388-16} DefaultSecurityLogic.java[perform]:147) - Starting authentication
 INFO [2019-11-13 17:18:53,764] ({qtp89387388-16} IndirectClient.java[getRedirectAction]:96) - AJAX request detected -> returning the appropriate action
DEBUG [2019-11-13 17:18:53,808] ({qtp89387388-16} AbstractExceptionAwareLogic.java[handleException]:41) - extra HTTP action required in security: 401


____________________________________________________AFTER KEYCLOAK AUTHENTIFICATION____________________________________________________


DEBUG [2019-11-13 17:19:47,253] ({qtp89387388-17} DefaultCallbackLogic.java[perform]:40) - === CALLBACK ===
DEBUG [2019-11-13 17:19:47,256] ({qtp89387388-17} DefaultCallbackClientFinder.java[find]:43) - result: [OidcClient]
DEBUG [2019-11-13 17:19:47,257] ({qtp89387388-17} DefaultCallbackLogic.java[perform]:86) - foundClient: #OidcClient# | name: OidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@4a340984 | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@49b27cca | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@5f988363 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@579a6259 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d883907 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@67064650 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@7c1e4248 | authorizationGenerators: [org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator@26dbb986] | configuration: #OidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@78126f38 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@58d02ea3 | |
DEBUG [2019-11-13 17:19:47,263] ({qtp89387388-17} OidcExtractor.java[extract]:66) - Authentication response successful
DEBUG [2019-11-13 17:19:47,308] ({qtp89387388-17} OidcAuthenticator.java[validate]:142) - Token response: status=200, content={"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g","expires_in":300,"refresh_expires_in":1800,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs","token_type":"bearer","id_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiJkMjVjZmY2Ny0wNTM3LTQ3MjEtYmI0MC00NjlkNTFiZjQ1MDIiLCJleHAiOjE1NzM2NjIyODcsIm5iZiI6MCwiaWF0IjoxNTczNjYxOTg3LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJ6ZXBwZWxpbi1jbGllbnQiLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJJRCIsImF6cCI6InplcHBlbGluLWNsaWVudCIsIm5vbmNlIjoick9ib2xtMUdEYlZ5WXZOaXZfa3JjZWJPa1pyY2VhdlMxNGZKa2k4NlN1byIsImF1dGhfdGltZSI6MTU3MzY2MTk4Nywic2Vzc2lvbl9zdGF0ZSI6ImRiZDAxYmFmLTA5YTEtNGI0ZC1iZDdiLTM4NzU4ZGMwYWU5YyIsImFjciI6IjEiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.CVCbMYW-pk6tGx5Jq4y4xs6MX4CsMiseWb9ijSS77l219oowXA3CzZKeP1KlWXeNbk9YkqOU4XCusC5ioHIwHrPN0EXZK-LEmvOnXQd6aWMU64jyrmyLLkbgWq636HO3vBgOHd-DDHi_N4VIkkCeAhrK9_qhDkWEWkO0EZvc1ZRUZBFSxRk-aPwnc-3VnY7wvqSLmNSoNtP9TThz6KAi1xtP33dJPodYsZXYABkpW9SLKLMstOh-VBLv1dnJLuPoYrJljKcyavC5nLRl73JTkZO1LlWwXfJDSEekSQTijAkEKoeZ3dxMhNihqkhT4NQRFMY1ucC5LW_6NJLvnv0lHg","not-before-policy":0,"session_state":"dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c","scope":"openid profile email"}

DEBUG [2019-11-13 17:19:47,329] ({qtp89387388-17} OidcAuthenticator.java[validate]:149) - Token response successful
DEBUG [2019-11-13 17:19:47,329] ({qtp89387388-17} BaseClient.java[retrieveCredentials]:74) - Credentials validation took: 65 ms
DEBUG [2019-11-13 17:19:47,330] ({qtp89387388-17} DefaultCallbackLogic.java[perform]:90) - credentials: #OidcCredentials# | code: c27f9d40-c685-40cb-a02c-2163e800f04b.dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c.fbcd71d0-e0e2-453a-bcd0-9e3dc8307362 | accessToken: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g | refreshToken: eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs | idToken: com.nimbusds.jwt.SignedJWT@515622ec |
DEBUG [2019-11-13 17:19:47,330] ({qtp89387388-17} BaseClient.java[getUserProfile]:88) - credentials : #OidcCredentials# | code: c27f9d40-c685-40cb-a02c-2163e800f04b.dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c.fbcd71d0-e0e2-453a-bcd0-9e3dc8307362 | accessToken: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g | refreshToken: eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs | idToken: com.nimbusds.jwt.SignedJWT@515622ec |
 WARN [2019-11-13 17:19:47,331] ({qtp89387388-17} TokenValidator.java[<init>]:46) - Preferred JWS algorithm: null not available. Using all metadata algorithms: [PS384, ES384, RS384, HS256, HS512, ES256, RS256, HS384, ES512, PS256, PS512, RS512]
DEBUG [2019-11-13 17:19:47,360] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: access_token / value: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g / class com.nimbusds.oauth2.sdk.token.BearerAccessToken
DEBUG [2019-11-13 17:19:47,360] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: id_token / value: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.CVCbMYW-pk6tGx5Jq4y4xs6MX4CsMiseWb9ijSS77l219oowXA3CzZKeP1KlWXeNbk9YkqOU4XCusC5ioHIwHrPN0EXZK-LEmvOnXQd6aWMU64jyrmyLLkbgWq636HO3vBgOHd-DDHi_N4VIkkCeAhrK9_qhDkWEWkO0EZvc1ZRUZBFSxRk-aPwnc-3VnY7wvqSLmNSoNtP9TThz6KAi1xtP33dJPodYsZXYABkpW9SLKLMstOh-VBLv1dnJLuPoYrJljKcyavC5nLRl73JTkZO1LlWwXfJDSEekSQTijAkEKoeZ3dxMhNihqkhT4NQRFMY1ucC5LW_6NJLvnv0lHg / class java.lang.String
DEBUG [2019-11-13 17:19:47,360] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: refresh_token / value: eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs / class com.nimbusds.oauth2.sdk.token.RefreshToken
DEBUG [2019-11-13 17:19:47,360] ({qtp89387388-17} OidcProfileCreator.java[create]:79) - Refresh Token successful retrieved
DEBUG [2019-11-13 17:19:47,407] ({qtp89387388-17} OidcProfileCreator.java[create]:103) - Token response: status=200, content={"sub":"23d46dce-ccbb-41c3-8dd8-49ddb29bb74b","email_verified":false,"preferred_username":"esirem"}

DEBUG [2019-11-13 17:19:47,413] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: sub / value: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b / class java.lang.String
DEBUG [2019-11-13 17:19:47,414] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: sub / value: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b / class java.lang.String
DEBUG [2019-11-13 17:19:47,414] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: email_verified / value: false / class java.lang.Boolean
DEBUG [2019-11-13 17:19:47,414] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: email_verified / value: false / class java.lang.Boolean
DEBUG [2019-11-13 17:19:47,414] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: preferred_username / value: esirem / class java.lang.String
DEBUG [2019-11-13 17:19:47,415] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: preferred_username / value: esirem / class java.lang.String
DEBUG [2019-11-13 17:19:47,415] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: iss / value: http://localhost:5000/auth/realms/zeppelin / class java.lang.String
DEBUG [2019-11-13 17:19:47,415] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: iss / value: http://localhost:5000/auth/realms/zeppelin / class java.lang.String
DEBUG [2019-11-13 17:19:47,416] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: typ / value: ID / class java.lang.String
DEBUG [2019-11-13 17:19:47,416] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: typ / value: ID / class java.lang.String
DEBUG [2019-11-13 17:19:47,416] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: nonce / value: rObolm1GDbVyYvNiv_krcebOkZrceavS14fJki86Suo / class java.lang.String
DEBUG [2019-11-13 17:19:47,416] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: nonce / value: rObolm1GDbVyYvNiv_krcebOkZrceavS14fJki86Suo / class java.lang.String
DEBUG [2019-11-13 17:19:47,416] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: aud / value: [zeppelin-client] / class java.util.ArrayList
DEBUG [2019-11-13 17:19:47,416] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: aud / value: [zeppelin-client] / class java.util.ArrayList
DEBUG [2019-11-13 17:19:47,416] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: acr / value: 1 / class java.lang.String
DEBUG [2019-11-13 17:19:47,417] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: acr / value: 1 / class java.lang.String
DEBUG [2019-11-13 17:19:47,417] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: nbf / value: Thu Jan 01 01:00:00 CET 1970 / class java.util.Date
DEBUG [2019-11-13 17:19:47,417] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: nbf / value: Thu Jan 01 01:00:00 CET 1970 / class java.util.Date
DEBUG [2019-11-13 17:19:47,417] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: azp / value: zeppelin-client / class java.lang.String
DEBUG [2019-11-13 17:19:47,417] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: azp / value: zeppelin-client / class java.lang.String
DEBUG [2019-11-13 17:19:47,417] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: auth_time / value: Wed Nov 13 17:19:47 CET 2019 / class java.util.Date
DEBUG [2019-11-13 17:19:47,418] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: auth_time / value: Wed Nov 13 17:19:47 CET 2019 / class java.util.Date
DEBUG [2019-11-13 17:19:47,418] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: exp / value: Wed Nov 13 17:24:47 CET 2019 / class java.util.Date
DEBUG [2019-11-13 17:19:47,418] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: exp / value: Wed Nov 13 17:24:47 CET 2019 / class java.util.Date
DEBUG [2019-11-13 17:19:47,418] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: session_state / value: dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c / class java.lang.String
DEBUG [2019-11-13 17:19:47,418] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: session_state / value: dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c / class java.lang.String
DEBUG [2019-11-13 17:19:47,418] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: iat / value: Wed Nov 13 17:19:47 CET 2019 / class java.util.Date
DEBUG [2019-11-13 17:19:47,418] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: iat / value: Wed Nov 13 17:19:47 CET 2019 / class java.util.Date
DEBUG [2019-11-13 17:19:47,419] ({qtp89387388-17} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: jti / value: d25cff67-0537-4721-bb40-469d51bf4502 / class java.lang.String
DEBUG [2019-11-13 17:19:47,419] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: jti / value: d25cff67-0537-4721-bb40-469d51bf4502 / class java.lang.String
DEBUG [2019-11-13 17:19:47,419] ({qtp89387388-17} UserProfile.java[addAttributeToMap]:86) - adding => key: token_expiration_advance / value: -1 / class java.lang.Integer
DEBUG [2019-11-13 17:19:47,419] ({qtp89387388-17} BaseClient.java[retrieveUserProfile]:114) - profile: #OidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.CVCbMYW-pk6tGx5Jq4y4xs6MX4CsMiseWb9ijSS77l219oowXA3CzZKeP1KlWXeNbk9YkqOU4XCusC5ioHIwHrPN0EXZK-LEmvOnXQd6aWMU64jyrmyLLkbgWq636HO3vBgOHd-DDHi_N4VIkkCeAhrK9_qhDkWEWkO0EZvc1ZRUZBFSxRk-aPwnc-3VnY7wvqSLmNSoNtP9TThz6KAi1xtP33dJPodYsZXYABkpW9SLKLMstOh-VBLv1dnJLuPoYrJljKcyavC5nLRl73JTkZO1LlWwXfJDSEekSQTijAkEKoeZ3dxMhNihqkhT4NQRFMY1ucC5LW_6NJLvnv0lHg, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=rObolm1GDbVyYvNiv_krcebOkZrceavS14fJki86Suo, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Wed Nov 13 17:19:47 CET 2019, exp=Wed Nov 13 17:24:47 CET 2019, session_state=dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c, iat=Wed Nov 13 17:19:47 CET 2019, jti=d25cff67-0537-4721-bb40-469d51bf4502} | roles: [] | permissions: [] | isRemembered: false | clientName: null | linkedId: null |
DEBUG [2019-11-13 17:19:47,419] ({qtp89387388-17} DefaultCallbackLogic.java[perform]:93) - profile: #OidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.CVCbMYW-pk6tGx5Jq4y4xs6MX4CsMiseWb9ijSS77l219oowXA3CzZKeP1KlWXeNbk9YkqOU4XCusC5ioHIwHrPN0EXZK-LEmvOnXQd6aWMU64jyrmyLLkbgWq636HO3vBgOHd-DDHi_N4VIkkCeAhrK9_qhDkWEWkO0EZvc1ZRUZBFSxRk-aPwnc-3VnY7wvqSLmNSoNtP9TThz6KAi1xtP33dJPodYsZXYABkpW9SLKLMstOh-VBLv1dnJLuPoYrJljKcyavC5nLRl73JTkZO1LlWwXfJDSEekSQTijAkEKoeZ3dxMhNihqkhT4NQRFMY1ucC5LW_6NJLvnv0lHg, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=rObolm1GDbVyYvNiv_krcebOkZrceavS14fJki86Suo, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Wed Nov 13 17:19:47 CET 2019, exp=Wed Nov 13 17:24:47 CET 2019, session_state=dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c, iat=Wed Nov 13 17:19:47 CET 2019, jti=d25cff67-0537-4721-bb40-469d51bf4502} | roles: [] | permissions: [] | isRemembered: false | clientName: OidcClient | linkedId: null |
DEBUG [2019-11-13 17:19:47,423] ({qtp89387388-17} DefaultCallbackLogic.java[redirectToOriginallyRequestedUrl]:146) - redirectUrl: http://localhost:8080
DEBUG [2019-11-13 17:19:47,920] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-13 17:19:47,921] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/security/ticket
DEBUG [2019-11-13 17:19:47,921] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-13 17:19:47,921] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:95) - clients: oidcClient
DEBUG [2019-11-13 17:19:47,921] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: oidcClient
DEBUG [2019-11-13 17:19:47,921] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-13 17:19:47,921] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:79) - result: [OidcClient]
DEBUG [2019-11-13 17:19:47,922] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:97) - currentClients: [#OidcClient# | name: OidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@4a340984 | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@49b27cca | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@5f988363 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@579a6259 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d883907 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@67064650 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@7c1e4248 | authorizationGenerators: [org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator@26dbb986] | configuration: #OidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@78126f38 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@58d02ea3 | |]
DEBUG [2019-11-13 17:19:47,922] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
DEBUG [2019-11-13 17:19:47,922] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:103) - profiles: [#OidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiJkMjVjZmY2Ny0wNTM3LTQ3MjEtYmI0MC00NjlkNTFiZjQ1MDIiLCJleHAiOjE1NzM2NjIyODcsIm5iZiI6MCwiaWF0IjoxNTczNjYxOTg3LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJ6ZXBwZWxpbi1jbGllbnQiLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJJRCIsImF6cCI6InplcHBlbGluLWNsaWVudCIsIm5vbmNlIjoick9ib2xtMUdEYlZ5WXZOaXZfa3JjZWJPa1pyY2VhdlMxNGZKa2k4NlN1byIsImF1dGhfdGltZSI6MTU3MzY2MTk4Nywic2Vzc2lvbl9zdGF0ZSI6ImRiZDAxYmFmLTA5YTEtNGI0ZC1iZDdiLTM4NzU4ZGMwYWU5YyIsImFjciI6IjEiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.CVCbMYW-pk6tGx5Jq4y4xs6MX4CsMiseWb9ijSS77l219oowXA3CzZKeP1KlWXeNbk9YkqOU4XCusC5ioHIwHrPN0EXZK-LEmvOnXQd6aWMU64jyrmyLLkbgWq636HO3vBgOHd-DDHi_N4VIkkCeAhrK9_qhDkWEWkO0EZvc1ZRUZBFSxRk-aPwnc-3VnY7wvqSLmNSoNtP9TThz6KAi1xtP33dJPodYsZXYABkpW9SLKLMstOh-VBLv1dnJLuPoYrJljKcyavC5nLRl73JTkZO1LlWwXfJDSEekSQTijAkEKoeZ3dxMhNihqkhT4NQRFMY1ucC5LW_6NJLvnv0lHg, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=rObolm1GDbVyYvNiv_krcebOkZrceavS14fJki86Suo, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Wed Nov 13 17:19:47 CET 2019, exp=Wed Nov 13 17:24:47 CET 2019, session_state=dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c, iat=Wed Nov 13 17:19:47 CET 2019, jti=d25cff67-0537-4721-bb40-469d51bf4502} | roles: [] | permissions: [] | isRemembered: false | clientName: OidcClient | linkedId: null |]
DEBUG [2019-11-13 17:19:47,922] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:137) - authorizers: null
DEBUG [2019-11-13 17:19:47,922] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:139) - authenticated and authorized -> grant access


____________________________________________________LOGOUT____________________________________________________

DEBUG [2019-11-13 17:22:20,112] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-13 17:22:20,113] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/login/logout
DEBUG [2019-11-13 17:22:20,113] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-13 17:22:20,113] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:95) - clients: oidcClient
DEBUG [2019-11-13 17:22:20,113] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: oidcClient
DEBUG [2019-11-13 17:22:20,113] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-13 17:22:20,113] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:79) - result: [OidcClient]
DEBUG [2019-11-13 17:22:20,114] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:97) - currentClients: [#OidcClient# | name: OidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@4a340984 | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@49b27cca | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@5f988363 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@579a6259 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d883907 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@67064650 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@7c1e4248 | authorizationGenerators: [org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator@26dbb986] | configuration: #OidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@78126f38 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@58d02ea3 | |]
DEBUG [2019-11-13 17:22:20,114] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
DEBUG [2019-11-13 17:22:20,114] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:103) - profiles: [#OidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.CVCbMYW-pk6tGx5Jq4y4xs6MX4CsMiseWb9ijSS77l219oowXA3CzZKeP1KlWXeNbk9YkqOU4XCusC5ioHIwHrPN0EXZK-LEmvOnXQd6aWMU64jyrmyLLkbgWq636HO3vBgOHd-DDHi_N4VIkkCeAhrK9_qhDkWEWkO0EZvc1ZRUZBFSxRk-aPwnc-3VnY7wvqSLmNSoNtP9TThz6KAi1xtP33dJPodYsZXYABkpW9SLKLMstOh-VBLv1dnJLuPoYrJljKcyavC5nLRl73JTkZO1LlWwXfJDSEekSQTijAkEKoeZ3dxMhNihqkhT4NQRFMY1ucC5LW_6NJLvnv0lHg, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=rObolm1GDbVyYvNiv_krcebOkZrceavS14fJki86Suo, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.MEGpWX_pGd71Q9OcuW9BvsZg0kYMOAeTQYlRR_CtGtreYvdGJlY9R1MACLx-v_CJViUX0uYKm4VaEDh8B1jOOf_X-P3ZECM6ilduegyOjqNWTHt7YXnLjF-C3Xs4pRE3ivzlhkqWJFPxP1ts3qeyvr3h9TRAzC3jZuDQ6IykzvSRNQqi1eGSThw4BXlTZ-yijiRYLS_QZ6QLlrLGJlKDew4BEoRl8k1H-BSNrTXUWQxBNt0LcEP6Bfa3_9zlnjUpa399grUX00rlU1bIFMB1t1irZ8PRKWQNNpQz3oAHg3md6GMOwR-qM8PwypHB8XGzUuYOMRo2kmo7tlZ88rOC5g, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.eyJqdGkiOiJmMjZkMzg4OC0xNzZkLTQ2MDItOTQwMC1mMDNlZmI1NThmYjkiLCJleHAiOjE1NzM2NjM3ODcsIm5iZiI6MCwiaWF0IjoxNTczNjYxOTg3LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJSZWZyZXNoIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiJyT2JvbG0xR0RiVnlZdk5pdl9rcmNlYk9rWnJjZWF2UzE0ZkpraTg2U3VvIiwiYXV0aF90aW1lIjowLCJzZXNzaW9uX3N0YXRlIjoiZGJkMDFiYWYtMDlhMS00YjRkLWJkN2ItMzg3NThkYzBhZTljIiwicmVhbG1fYWNjZXNzIjp7InJvbGVzIjpbIm9mZmxpbmVfYWNjZXNzIiwidW1hX2F1dGhvcml6YXRpb24iXX0sInJlc291cmNlX2FjY2VzcyI6eyJ6ZXBwZWxpbi1jbGllbnQiOnsicm9sZXMiOlsidXNlciJdfSwiYWNjb3VudCI6eyJyb2xlcyI6WyJtYW5hZ2UtYWNjb3VudCIsIm1hbmFnZS1hY2NvdW50LWxpbmtzIiwidmlldy1wcm9maWxlIl19fSwic2NvcGUiOiJvcGVuaWQgcHJvZmlsZSBlbWFpbCJ9.zCTLCWiJZazj1FMvmJJX1k0gdOtliw5TCuIz8TBgkBs, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Wed Nov 13 17:19:47 CET 2019, exp=Wed Nov 13 17:24:47 CET 2019, session_state=dbd01baf-09a1-4b4d-bd7b-38758dc0ae9c, iat=Wed Nov 13 17:19:47 CET 2019, jti=d25cff67-0537-4721-bb40-469d51bf4502} | roles: [] | permissions: [] | isRemembered: false | clientName: OidcClient | linkedId: null |]
DEBUG [2019-11-13 17:22:20,114] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:137) - authorizers: null
DEBUG [2019-11-13 17:22:20,114] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:139) - authenticated and authorized -> grant access
DEBUG [2019-11-13 17:22:20,127] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-13 17:22:20,127] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/login/logout
DEBUG [2019-11-13 17:22:20,128] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-13 17:22:20,128] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:95) - clients: oidcClient
DEBUG [2019-11-13 17:22:20,128] ({qtp89387388-58} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: oidcClient
DEBUG [2019-11-13 17:22:20,128] ({qtp89387388-58} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-13 17:22:20,128] ({qtp89387388-58} DefaultSecurityClientFinder.java[find]:79) - result: [OidcClient]
DEBUG [2019-11-13 17:22:20,128] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:97) - currentClients: [#OidcClient# | name: OidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@4a340984 | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@49b27cca | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@5f988363 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@579a6259 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d883907 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@67064650 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@7c1e4248 | authorizationGenerators: [org.pac4j.core.authorization.generator.FromAttributesAuthorizationGenerator@26dbb986] | configuration: #OidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@78126f38 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@58d02ea3 | |]
DEBUG [2019-11-13 17:22:20,128] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
DEBUG [2019-11-13 17:22:20,129] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:103) - profiles: []
DEBUG [2019-11-13 17:22:20,129] ({qtp89387388-58} DefaultSecurityLogic.java[perform]:147) - Starting authentication
 INFO [2019-11-13 17:22:20,129] ({qtp89387388-58} IndirectClient.java[getRedirectAction]:96) - AJAX request detected -> returning the appropriate action
DEBUG [2019-11-13 17:22:20,131] ({qtp89387388-58} AbstractExceptionAwareLogic.java[handleException]:41) - extra HTTP action required in security: 401



2. KeycloacOidc configuration logs (FAILLING) :
Action : Browse http://localhost:8080/ which is the path to zeppelin. There is no redirection to Keycloak Authentification, it is stuck on a non-logged zeppelin interface page where there is no possibility of login, and so nothing happens.

DEBUG [2019-11-13 16:56:00,905] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-13 16:56:00,913] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/security/ticket
DEBUG [2019-11-13 16:56:00,914] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:92)  - matchers: null
DEBUG [2019-11-13 16:56:00,914] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:95) - clients: oidcClient
DEBUG [2019-11-13 16:56:00,914] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: oidcClient
DEBUG [2019-11-13 16:56:00,915] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null

There is no more log with KeycloakOidc, as I am not redirected to keycloak from zeppelin URL, I do not have more log on it. I also noticed in the previous org.apache.shiro logs that discoveryURI is set to null with the KeycloakOidc configuration while it is set to "http://localhost:5000/auth/realms/zeppelin/.well-known/openid-configuration" with the Oidc configuration. Is the integration of baseUri (from KeycloakOidcConfiguration.java) are correctly done with discoveryURI (from OidcConfiguration.java) ?

PS : If you can test it on your side with a simple instance of zeppelin (https://www.apache.org/dist/zeppelin/zeppelin-0.8.2/) and an instance of Keycloak running on docker, it will be faster and easier for you to understand. All you have to do is to unzip the tar file you downloaded from the link above and add the following JAR files (buji-pac4j-4.1.1, pac4j-oidc-3.8.3, pac4j-core-3.8.3 with their dependencies) inside the '/lib' folder. After that you have to configure the shiro.ini file which is inside the '/conf' directory as I've configured above (Oidc and KeycloakOidc) and then test it. 

Thank you for your help!

Best regards,
E.M

Jérôme LELEU

unread,
Nov 14, 2019, 2:10:44 AM11/14/19
to esirem, Pac4j development mailing list
Hi,

I just made a test with the buji-pac4j-demo and I think I know the root cause. It's so simple: the KeycloakOidcClient is named KeycloakOidcClient while the OidcClient is named OidcClient and the oidcSecurityFilter only references the "oidcClient" (oidcSecurityFilter.clients = oidcClient).

Add oidcClient.name = OidcClient with Keycloak and it will work.

Thanks.
Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.

esirem

unread,
Nov 14, 2019, 7:44:42 AM11/14/19
to Pac4j development mailing list
Hi Jérôme,

Thanks for your reply, that finally solve my issue !  Now the keycloak authentification login to zeppelin is working well, but I have another minor problem facing with both Oidc and KeycloakOidc configuration, the logout part.

As said, I am now able successfully authenticate my user and log into Zeppelin app by Shiro, OIDC and Keycloak, but unfortunately I am not able to log out. It loops when I click on Logout button keeping my user being logged in with the initial token id, and does not direct me to Keycloak for another login attempt. The scenario is: 
1. I hit default Zeppelin URL and then I am transferred to Keycloak for user credentials.
2. I authenticate by user name and password so am logged into Zeppelin. 
3. I click on "Logout" button within Zeppelin app once I am there, then "Logout success" dialog box appears, and I am redirected to main Zeppelin screen. (Inspect mode : baseUrlSrv.getRestApiBase() + '/login/logout' followed by window.location = baseUrlSrv.getBase() from navbar.controller.js)
4. Once I am redirected to main page, default url is triggered and my user is logged in again without any promt for credentials because of stored token. So is it an issue with the LogoutFilter (io.buji.pac4j.filter.LogoutFilter) not clearing the stored token after logout process or is it a bad configuration inside the shiro.ini :

[main]
logoutFilter = io.buji.pac4j.filter.LogoutFilter
logoutFilter.defaultUrl = http://localhost:8080
logoutFilter.localLogout = true
logoutFilter.centralLogout = true
logoutFilter.config = $config

[urls]
/api/login/logout = logoutFilter

At the meantime, I also noticed that when I put directly "http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout" in another tab and go back to zeppelin tab to realize the logout process, it works. So I guess that this shiro.ini configuration is not calling the keycloak logout link. So am I calling the LogoutFilter in a wrong way inside the shiro.ini configuration or is the LogoutFilter (io.buji.pac4j.filter.LogoutFilter) not clearing the stored token after logout process ?

Best regards,
E.M

Jérôme LELEU

unread,
Nov 15, 2019, 2:27:12 AM11/15/19
to esirem, Pac4j development mailing list
Hi,

Given you have enabled the localLogout and centralLogout, you should definitely be logged out if the right URL is called: /api/login/logout. As it seems so, I need the full logs again to try to see what's going on.
Thanks.
Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.

esirem

unread,
Nov 15, 2019, 4:23:22 AM11/15/19
to Pac4j development mailing list
Hi,

Here the logs of org.pac4j, io.buji and org.apache.shiro while pressing the logout button into zeppelin interface :

TRACE [2019-11-15 10:15:16,307] ({qtp89387388-14} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:16,307] ({qtp89387388-14} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:16,307] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@4219b2f5
DEBUG [2019-11-15 10:15:16,308] ({qtp89387388-14} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [4582bcb1-87cc-47c4-bae5-be6971f56f7e]
TRACE [2019-11-15 10:15:16,308] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,308] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,308] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,308] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,309] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,309] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,309] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,309] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,310] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,310] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,310] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,310] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,311] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,311] ({qtp89387388-14} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,311] ({qtp89387388-14} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,311] ({qtp89387388-14} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,311] ({qtp89387388-14} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,311] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,312] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,312] ({qtp89387388-14} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/login/logout].  Utilizing corresponding filter chain...
TRACE [2019-11-15 10:15:16,312] ({qtp89387388-14} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-15 10:15:16,312] ({qtp89387388-14} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
DEBUG [2019-11-15 10:15:16,312] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-15 10:15:16,313] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/login/logout
DEBUG [2019-11-15 10:15:16,313] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-15 10:15:16,313] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:95) - clients: keycloakOidcClient
DEBUG [2019-11-15 10:15:16,313] ({qtp89387388-14} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: keycloakOidcClient
DEBUG [2019-11-15 10:15:16,313] ({qtp89387388-14} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-15 10:15:16,314] ({qtp89387388-14} DefaultSecurityClientFinder.java[find]:79) - result: [keycloakOidcClient]
DEBUG [2019-11-15 10:15:16,314] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:97) - currentClients: [#KeycloakOidcClient# | name: keycloakOidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@266d1b8e | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@44a72b54 | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@52eb37e7 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@7316a6a7 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d697220 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@40e91352 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@4bb650a7 | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7, org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@d53f4e8] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@7b5d7f10 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |]
DEBUG [2019-11-15 10:15:16,314] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
TRACE [2019-11-15 10:15:16,314] ({qtp89387388-14} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,315] ({qtp89387388-14} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,315] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,315] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
DEBUG [2019-11-15 10:15:16,316] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:103) - profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiI0OGQ5ZDI2MC1hZDhiLTQ0MWItOWU0OC01MDVlOWZiYzY3ZmUiLCJleHAiOjE1NzM4MDk1ODksIm5iZiI6MCwiaWF0IjoxNTczODA5Mjg5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJ6ZXBwZWxpbi1jbGllbnQiLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJJRCIsImF6cCI6InplcHBlbGluLWNsaWVudCIsIm5vbmNlIjoidnJSckREU0pjU0tYemxZTDlLOHdsb19nS0U2TnNhbE5oTmdOeXJaemR2SSIsImF1dGhfdGltZSI6MTU3MzgwOTI4OSwic2Vzc2lvbl9zdGF0ZSI6IjJkYzhmN2M0LWJjYzYtNDI0NC1iZTA0LThhZWM5Y2I1OWViZSIsImFjciI6IjEiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.gFCSWqHUJ-LIIdE4VmpgdXFDHvN7X6YniUdAUyIHaobf3vyOruSZoElBK2knSwEV3Fc7Iu_B5lrsyLbx21xUFH3UzUhAfhxjTn2uyS0AIPYGzI9OthRRpbRp2RbgrnmXIdYVA6F_b2cqWepQorSP4nu1vzHRRMm114dJcUVaMXZg4uyh54Og47BXi0O-1_Rxe0YqlY3EvMZu2Nt6WcebkTX9UEV4SaS8cFUUrsI57HouDNmTrumfR-DpiH15iSsOKQkLjFlz4RUb7xViwomA17qplObuDAOKsbz_3rDRzyxgNx8WjWrlBbXmu4r9ZMbVQAJr8607p1lIFEQshUZChQ, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=vrRrDDSJcSKXzlYL9K8wlo_gKE6NsalNhNgNyrZzdvI, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.Gs0PsPdxUJLAhvee_KW_XfjXzzUuAJuuSgO_IrS_0Vw7msep3_jLqirLTT2Vbo172EYvjun5tGwbXyywUAL7nHGhmAgHOpIPrhMRK91gTVkG-H4MpD7w-RRlcNvElAsOIgbJQpqO9vIXCj1bTk6l7zuKblIXCbsNXf5Jwl1q2xyy_fHduiShp7GzN77tw-F5JYIOoTtlM38Z02mo63ZIt7LQKYUELOA_Pr5jsvqGUdTerQ0OkxmgJjZiboTJ4zuXyf1F1yecIDBp0G_60iM49zmA1Txm5QdbVGZp3tMUjkcOHPS4w7Pk_V6N18lVjBhNTfUv33l3A3NfiwcHd-tsHQ, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.eyJqdGkiOiI1Y2VhYmFmOS1kMzNjLTRjMGItODk4Mi0zMGE2ODdkMTRhNmYiLCJleHAiOjE1NzM4MTEwODksIm5iZiI6MCwiaWF0IjoxNTczODA5Mjg5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJSZWZyZXNoIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiJ2clJyRERTSmNTS1h6bFlMOUs4d2xvX2dLRTZOc2FsTmhOZ055clp6ZHZJIiwiYXV0aF90aW1lIjowLCJzZXNzaW9uX3N0YXRlIjoiMmRjOGY3YzQtYmNjNi00MjQ0LWJlMDQtOGFlYzljYjU5ZWJlIiwicmVhbG1fYWNjZXNzIjp7InJvbGVzIjpbIm9mZmxpbmVfYWNjZXNzIiwidW1hX2F1dGhvcml6YXRpb24iXX0sInJlc291cmNlX2FjY2VzcyI6eyJ6ZXBwZWxpbi1jbGllbnQiOnsicm9sZXMiOlsidXNlciJdfSwiYWNjb3VudCI6eyJyb2xlcyI6WyJtYW5hZ2UtYWNjb3VudCIsIm1hbmFnZS1hY2NvdW50LWxpbmtzIiwidmlldy1wcm9maWxlIl19fSwic2NvcGUiOiJvcGVuaWQgcHJvZmlsZSBlbWFpbCJ9.2FqksV6dS_1zrC24g07XAPj0Ut8OCnm044h3tVLgZR0, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:19:49 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:14:49 CET 2019, jti=48d9d260-ad8b-441b-9e48-505e9fbc67fe} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |]
DEBUG [2019-11-15 10:15:16,316] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:137) - authorizers: null
DEBUG [2019-11-15 10:15:16,316] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:139) - authenticated and authorized -> grant access
TRACE [2019-11-15 10:15:16,316] ({qtp89387388-14} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-15 10:15:16,319] ({qtp89387388-14} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,319] ({qtp89387388-14} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,320] ({qtp89387388-14} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,320] ({qtp89387388-14} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,320] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,321] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
TRACE [2019-11-15 10:15:16,321] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,322] ({qtp89387388-14} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@55d5a6f3
DEBUG [2019-11-15 10:15:16,322] ({qtp89387388-14} AbstractNativeSessionManager.java[stop]:284) - Stopping session with id [4582bcb1-87cc-47c4-bae5-be6971f56f7e]
DEBUG [2019-11-15 10:15:16,322] ({qtp89387388-14} DefaultWebSessionManager.java[onStop]:314) - Session has been stopped (subject logout or explicit stop).  Removing session ID cookie.
TRACE [2019-11-15 10:15:16,323] ({qtp89387388-14} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-15 10:15:16,324] ({qtp89387388-14} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [JSESSIONID=deleteMe; Path=/; Max-Age=0; Expires=Thu, 14-Nov-2019 09:15:16 GMT]
TRACE [2019-11-15 10:15:16,324] ({qtp89387388-14} SimpleCookie.java[removeFrom]:375) - Removed 'JSESSIONID' cookie by setting maxAge=0
TRACE [2019-11-15 10:15:16,326] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,326] ({qtp89387388-14} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-15 10:15:16,326] ({qtp89387388-14} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [rememberMe=deleteMe; Path=/; Max-Age=0; Expires=Thu, 14-Nov-2019 09:15:16 GMT]
TRACE [2019-11-15 10:15:16,327] ({qtp89387388-14} SimpleCookie.java[removeFrom]:375) - Removed 'rememberMe' cookie by setting maxAge=0
TRACE [2019-11-15 10:15:16,327] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
DEBUG [2019-11-15 10:15:16,328] ({qtp89387388-14} DefaultSecurityManager.java[logout]:559) - Logging out subject with primary principal #Pac4jPrincipal# | profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.gFCSWqHUJ-LIIdE4VmpgdXFDHvN7X6YniUdAUyIHaobf3vyOruSZoElBK2knSwEV3Fc7Iu_B5lrsyLbx21xUFH3UzUhAfhxjTn2uyS0AIPYGzI9OthRRpbRp2RbgrnmXIdYVA6F_b2cqWepQorSP4nu1vzHRRMm114dJcUVaMXZg4uyh54Og47BXi0O-1_Rxe0YqlY3EvMZu2Nt6WcebkTX9UEV4SaS8cFUUrsI57HouDNmTrumfR-DpiH15iSsOKQkLjFlz4RUb7xViwomA17qplObuDAOKsbz_3rDRzyxgNx8WjWrlBbXmu4r9ZMbVQAJr8607p1lIFEQshUZChQ, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=vrRrDDSJcSKXzlYL9K8wlo_gKE6NsalNhNgNyrZzdvI, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.Gs0PsPdxUJLAhvee_KW_XfjXzzUuAJuuSgO_IrS_0Vw7msep3_jLqirLTT2Vbo172EYvjun5tGwbXyywUAL7nHGhmAgHOpIPrhMRK91gTVkG-H4MpD7w-RRlcNvElAsOIgbJQpqO9vIXCj1bTk6l7zuKblIXCbsNXf5Jwl1q2xyy_fHduiShp7GzN77tw-F5JYIOoTtlM38Z02mo63ZIt7LQKYUELOA_Pr5jsvqGUdTerQ0OkxmgJjZiboTJ4zuXyf1F1yecIDBp0G_60iM49zmA1Txm5QdbVGZp3tMUjkcOHPS4w7Pk_V6N18lVjBhNTfUv33l3A3NfiwcHd-tsHQ, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.2FqksV6dS_1zrC24g07XAPj0Ut8OCnm044h3tVLgZR0, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:19:49 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:14:49 CET 2019, jti=48d9d260-ad8b-441b-9e48-505e9fbc67fe} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |] |
DEBUG [2019-11-15 10:15:16,328] ({qtp89387388-14} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-15 10:15:16,330] ({qtp89387388-14} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
TRACE [2019-11-15 10:15:16,330] ({qtp89387388-14} CachingRealm.java[clearCache]:171) - Cleared cache entries for account with principals [#Pac4jPrincipal# | profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.gFCSWqHUJ-LIIdE4VmpgdXFDHvN7X6YniUdAUyIHaobf3vyOruSZoElBK2knSwEV3Fc7Iu_B5lrsyLbx21xUFH3UzUhAfhxjTn2uyS0AIPYGzI9OthRRpbRp2RbgrnmXIdYVA6F_b2cqWepQorSP4nu1vzHRRMm114dJcUVaMXZg4uyh54Og47BXi0O-1_Rxe0YqlY3EvMZu2Nt6WcebkTX9UEV4SaS8cFUUrsI57HouDNmTrumfR-DpiH15iSsOKQkLjFlz4RUb7xViwomA17qplObuDAOKsbz_3rDRzyxgNx8WjWrlBbXmu4r9ZMbVQAJr8607p1lIFEQshUZChQ, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=vrRrDDSJcSKXzlYL9K8wlo_gKE6NsalNhNgNyrZzdvI, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.Gs0PsPdxUJLAhvee_KW_XfjXzzUuAJuuSgO_IrS_0Vw7msep3_jLqirLTT2Vbo172EYvjun5tGwbXyywUAL7nHGhmAgHOpIPrhMRK91gTVkG-H4MpD7w-RRlcNvElAsOIgbJQpqO9vIXCj1bTk6l7zuKblIXCbsNXf5Jwl1q2xyy_fHduiShp7GzN77tw-F5JYIOoTtlM38Z02mo63ZIt7LQKYUELOA_Pr5jsvqGUdTerQ0OkxmgJjZiboTJ4zuXyf1F1yecIDBp0G_60iM49zmA1Txm5QdbVGZp3tMUjkcOHPS4w7Pk_V6N18lVjBhNTfUv33l3A3NfiwcHd-tsHQ, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.2FqksV6dS_1zrC24g07XAPj0Ut8OCnm044h3tVLgZR0, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:19:49 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:14:49 CET 2019, jti=48d9d260-ad8b-441b-9e48-505e9fbc67fe} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |] |]
TRACE [2019-11-15 10:15:16,330] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,331] ({qtp89387388-14} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,331] ({qtp89387388-14} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,331] ({qtp89387388-14} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] bound to thread [qtp89387388-14]
TRACE [2019-11-15 10:15:16,367] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:16,367] ({qtp89387388-13} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:16,368] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@2c4d8503
TRACE [2019-11-15 10:15:16,368] ({qtp89387388-13} SimpleCookie.java[readValue]:392) - No 'JSESSIONID' cookie value
DEBUG [2019-11-15 10:15:16,368] ({qtp89387388-13} DefaultSessionManager.java[retrieveSession]:218) - Unable to resolve session ID from SessionKey [org.apache.shiro.web.session.mgt.WebSessionKey@2c4d8503].  Returning null to indicate a session could not be found.
TRACE [2019-11-15 10:15:16,368] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-15 10:15:16,369] ({qtp89387388-13} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-15 10:15:16,369] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-15 10:15:16,369] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,369] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,369] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,369] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,370] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,370] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,370] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,370] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,370] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,370] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,370] ({qtp89387388-13} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/login/logout].  Utilizing corresponding filter chain...
TRACE [2019-11-15 10:15:16,371] ({qtp89387388-13} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-15 10:15:16,371] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
DEBUG [2019-11-15 10:15:16,371] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-15 10:15:16,371] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/login/logout
DEBUG [2019-11-15 10:15:16,371] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-15 10:15:16,371] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:95) - clients: keycloakOidcClient
DEBUG [2019-11-15 10:15:16,371] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: keycloakOidcClient
DEBUG [2019-11-15 10:15:16,371] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-15 10:15:16,372] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:79) - result: [keycloakOidcClient]
DEBUG [2019-11-15 10:15:16,372] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:97) - currentClients: [#KeycloakOidcClient# | name: keycloakOidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@266d1b8e | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@44a72b54 | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@52eb37e7 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@7316a6a7 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d697220 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@40e91352 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@4bb650a7 | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7, org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@d53f4e8] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@7b5d7f10 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |]
DEBUG [2019-11-15 10:15:16,372] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
TRACE [2019-11-15 10:15:16,372] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,372] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,372] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = true; session has id = false
DEBUG [2019-11-15 10:15:16,373] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:103) - profiles: []
DEBUG [2019-11-15 10:15:16,373] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:147) - Starting authentication
 INFO [2019-11-15 10:15:16,373] ({qtp89387388-13} IndirectClient.java[getRedirectAction]:96) - AJAX request detected -> returning the appropriate action
TRACE [2019-11-15 10:15:16,373] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,374] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,374] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = true; session has id = false
TRACE [2019-11-15 10:15:16,374] ({qtp89387388-13} DelegatingSubject.java[getSession]:338) - Starting session for host 127.0.0.1
TRACE [2019-11-15 10:15:16,374] ({qtp89387388-13} DefaultSessionManager.java[doCreateSession]:156) - Creating session for host 127.0.0.1
DEBUG [2019-11-15 10:15:16,374] ({qtp89387388-13} DefaultSessionManager.java[create]:175) - Creating new EIS record for new session instance [org.apache.shiro.session.mgt.SimpleSession,id=null]
TRACE [2019-11-15 10:15:16,374] ({qtp89387388-13} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-15 10:15:16,375] ({qtp89387388-13} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [JSESSIONID=eccd494d-6f7e-47f6-8bab-18f44f9d55a7; Path=/; HttpOnly]
TRACE [2019-11-15 10:15:16,375] ({qtp89387388-13} DefaultWebSessionManager.java[storeSessionId]:101) - Set session ID cookie for session with id eccd494d-6f7e-47f6-8bab-18f44f9d55a7
TRACE [2019-11-15 10:15:16,375] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@5b275155
TRACE [2019-11-15 10:15:16,375] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,375] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,376] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,376] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@5b275155
TRACE [2019-11-15 10:15:16,377] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,377] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:16,377] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:16,378] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@5b275155
DEBUG [2019-11-15 10:15:16,379] ({qtp89387388-13} AbstractExceptionAwareLogic.java[handleException]:41) - extra HTTP action required in security: 401
TRACE [2019-11-15 10:15:18,456] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:18,457] ({qtp89387388-13} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:18,457] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@395d654b
DEBUG [2019-11-15 10:15:18,457] ({qtp89387388-13} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [eccd494d-6f7e-47f6-8bab-18f44f9d55a7]
TRACE [2019-11-15 10:15:18,457] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,457] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-15 10:15:18,457] ({qtp89387388-13} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-15 10:15:18,458] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-15 10:15:18,458] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,458] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,458] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,458] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,459] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,459] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,459] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,459] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,459] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,459] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,459] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,460] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,460] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,460] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,460] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,460] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,460] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,460] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,461] ({qtp89387388-13} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/security/ticket].  Utilizing corresponding filter chain...
TRACE [2019-11-15 10:15:18,461] ({qtp89387388-13} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-15 10:15:18,461] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
DEBUG [2019-11-15 10:15:18,461] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-15 10:15:18,461] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/security/ticket
DEBUG [2019-11-15 10:15:18,462] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-15 10:15:18,462] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:95) - clients: keycloakOidcClient
DEBUG [2019-11-15 10:15:18,462] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: keycloakOidcClient
DEBUG [2019-11-15 10:15:18,462] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-15 10:15:18,463] ({qtp89387388-13} DefaultSecurityClientFinder.java[find]:79) - result: [keycloakOidcClient]
DEBUG [2019-11-15 10:15:18,463] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:97) - currentClients: [#KeycloakOidcClient# | name: keycloakOidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@266d1b8e | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@44a72b54 | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@52eb37e7 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@7316a6a7 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d697220 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@40e91352 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@4bb650a7 | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7, org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@d53f4e8] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@7b5d7f10 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |]
DEBUG [2019-11-15 10:15:18,463] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
TRACE [2019-11-15 10:15:18,464] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,464] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,464] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,464] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
DEBUG [2019-11-15 10:15:18,464] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:103) - profiles: []
DEBUG [2019-11-15 10:15:18,465] ({qtp89387388-13} DefaultSecurityLogic.java[perform]:147) - Starting authentication
 INFO [2019-11-15 10:15:18,465] ({qtp89387388-13} IndirectClient.java[getRedirectAction]:96) - AJAX request detected -> returning the appropriate action
TRACE [2019-11-15 10:15:18,465] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,465] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,466] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,466] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,466] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,466] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,466] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,466] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
TRACE [2019-11-15 10:15:18,467] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,468] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,468] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,468] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@67981f6a
DEBUG [2019-11-15 10:15:18,469] ({qtp89387388-13} AbstractExceptionAwareLogic.java[handleException]:41) - extra HTTP action required in security: 401
TRACE [2019-11-15 10:15:18,765] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:18,766] ({qtp89387388-13} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:18,766] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@27bdeb07
DEBUG [2019-11-15 10:15:18,766] ({qtp89387388-13} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [eccd494d-6f7e-47f6-8bab-18f44f9d55a7]
TRACE [2019-11-15 10:15:18,766] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,767] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-15 10:15:18,767] ({qtp89387388-13} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-15 10:15:18,767] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-15 10:15:18,767] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,767] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,767] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,768] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,768] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,768] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,768] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,768] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,768] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,768] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,773] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,773] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,774] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,774] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,774] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,774] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:18,774] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:18,785] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@46f1bb5c
TRACE [2019-11-15 10:15:18,786] ({qtp89387388-13} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/version] for requestURI [/api/version].  Utilizing corresponding filter chain...
TRACE [2019-11-15 10:15:18,786] ({qtp89387388-13} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-15 10:15:18,786] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-15 10:15:18,786] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'anon' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:18,786] ({qtp89387388-13} PathMatchingFilter.java[pathsMatch]:123) - Attempting to match pattern '/api/version' with current requestURI '/api/version'...
TRACE [2019-11-15 10:15:18,787] ({qtp89387388-13} PathMatchingFilter.java[preHandle]:176) - Current requestURI matches pattern '/api/version'.  Determining filter chain execution...
TRACE [2019-11-15 10:15:18,788] ({qtp89387388-13} PathMatchingFilter.java[isFilterChainContinued]:197) - Filter 'anon' is enabled for the current request under path '/api/version' with config [null].  Delegating to subclass implementation for 'onPreHandle' check.
TRACE [2019-11-15 10:15:18,788] ({qtp89387388-13} AdviceFilter.java[doFilterInternal]:133) - Invoked preHandle method.  Continuing chain?: [true]
TRACE [2019-11-15 10:15:18,790] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-15 10:15:18,807] ({qtp89387388-13} AdviceFilter.java[doFilterInternal]:142) - Successfully invoked postHandle method
TRACE [2019-11-15 10:15:18,807] ({qtp89387388-13} AdviceFilter.java[cleanup]:174) - Successfully invoked afterCompletion method.
TRACE [2019-11-15 10:15:19,113] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:19,113] ({qtp89387388-13} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:19,114] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@1454e9f4
DEBUG [2019-11-15 10:15:19,114] ({qtp89387388-13} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [eccd494d-6f7e-47f6-8bab-18f44f9d55a7]
TRACE [2019-11-15 10:15:19,114] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,115] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:499) - No identity (PrincipalCollection) found in the context.  Looking for a remembered identity.
TRACE [2019-11-15 10:15:19,115] ({qtp89387388-13} SimpleCookie.java[readValue]:392) - No 'rememberMe' cookie value
TRACE [2019-11-15 10:15:19,115] ({qtp89387388-13} DefaultSecurityManager.java[resolvePrincipals]:525) - No remembered identity found.  Returning original context.
TRACE [2019-11-15 10:15:19,115] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,115] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,116] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,116] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,116] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,117] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,117] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,117] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,117] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,118] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,118] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,118] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,118] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,118] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,119] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,119] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,119] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,119] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,119] ({qtp89387388-13} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/callback] for requestURI [/api/callback].  Utilizing corresponding filter chain...
TRACE [2019-11-15 10:15:19,120] ({qtp89387388-13} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-15 10:15:19,120] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
DEBUG [2019-11-15 10:15:19,120] ({qtp89387388-13} DefaultCallbackLogic.java[perform]:40) - === CALLBACK ===
DEBUG [2019-11-15 10:15:19,122] ({qtp89387388-13} DefaultCallbackClientFinder.java[find]:43) - result: [keycloakOidcClient]
DEBUG [2019-11-15 10:15:19,124] ({qtp89387388-13} DefaultCallbackLogic.java[perform]:86) - foundClient: #KeycloakOidcClient# | name: keycloakOidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@266d1b8e | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@44a72b54 | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@52eb37e7 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@7316a6a7 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d697220 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@40e91352 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@4bb650a7 | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7, org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@d53f4e8] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@7b5d7f10 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |
DEBUG [2019-11-15 10:15:19,124] ({qtp89387388-13} OidcExtractor.java[extract]:66) - Authentication response successful
TRACE [2019-11-15 10:15:19,125] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,125] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,125] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,126] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
DEBUG [2019-11-15 10:15:19,140] ({qtp89387388-13} OidcAuthenticator.java[validate]:142) - Token response: status=200, content={"access_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w","expires_in":300,"refresh_expires_in":1800,"refresh_token":"eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ","token_type":"bearer","id_token":"eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA","not-before-policy":0,"session_state":"2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe","scope":"openid profile email"}

DEBUG [2019-11-15 10:15:19,141] ({qtp89387388-13} OidcAuthenticator.java[validate]:149) - Token response successful
DEBUG [2019-11-15 10:15:19,141] ({qtp89387388-13} BaseClient.java[retrieveCredentials]:74) - Credentials validation took: 15 ms
TRACE [2019-11-15 10:15:19,141] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,141] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,141] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,142] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
DEBUG [2019-11-15 10:15:19,142] ({qtp89387388-13} DefaultCallbackLogic.java[perform]:90) - credentials: #OidcCredentials# | code: 3191d2bb-e726-4767-bb7f-2457ddd67f79.2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe.fbcd71d0-e0e2-453a-bcd0-9e3dc8307362 | accessToken: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w | refreshToken: eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ | idToken: com.nimbusds.jwt.SignedJWT@7bbde7fd |
DEBUG [2019-11-15 10:15:19,143] ({qtp89387388-13} BaseClient.java[getUserProfile]:88) - credentials : #OidcCredentials# | code: 3191d2bb-e726-4767-bb7f-2457ddd67f79.2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe.fbcd71d0-e0e2-453a-bcd0-9e3dc8307362 | accessToken: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w | refreshToken: eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ | idToken: com.nimbusds.jwt.SignedJWT@7bbde7fd |
DEBUG [2019-11-15 10:15:19,143] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: access_token / value: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w / class com.nimbusds.oauth2.sdk.token.BearerAccessToken
DEBUG [2019-11-15 10:15:19,143] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: id_token / value: eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiI1MGI1NWYxYi1lOWRjLTRhNjUtODJlZS1mMDE2MGZiNzJiODEiLCJleHAiOjE1NzM4MDk2MTksIm5iZiI6MCwiaWF0IjoxNTczODA5MzE5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJ6ZXBwZWxpbi1jbGllbnQiLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJJRCIsImF6cCI6InplcHBlbGluLWNsaWVudCIsIm5vbmNlIjoiNll1b3RVY0tsTUE1MWloUmFWeGpXazBlUHF0a1o0U1ZncF9FS1AxN1NtTSIsImF1dGhfdGltZSI6MTU3MzgwOTI4OSwic2Vzc2lvbl9zdGF0ZSI6IjJkYzhmN2M0LWJjYzYtNDI0NC1iZTA0LThhZWM5Y2I1OWViZSIsImFjciI6IjAiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA / class java.lang.String
DEBUG [2019-11-15 10:15:19,143] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: refresh_token / value: eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ / class com.nimbusds.oauth2.sdk.token.RefreshToken
DEBUG [2019-11-15 10:15:19,144] ({qtp89387388-13} OidcProfileCreator.java[create]:79) - Refresh Token successful retrieved
TRACE [2019-11-15 10:15:19,144] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,144] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,144] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,144] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
DEBUG [2019-11-15 10:15:19,162] ({qtp89387388-13} OidcProfileCreator.java[create]:103) - Token response: status=200, content={"sub":"23d46dce-ccbb-41c3-8dd8-49ddb29bb74b","email_verified":false,"preferred_username":"esirem"}

DEBUG [2019-11-15 10:15:19,162] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: sub / value: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b / class java.lang.String
DEBUG [2019-11-15 10:15:19,163] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: sub / value: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b / class java.lang.String
DEBUG [2019-11-15 10:15:19,165] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: email_verified / value: false / class java.lang.Boolean
DEBUG [2019-11-15 10:15:19,165] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: email_verified / value: false / class java.lang.Boolean
DEBUG [2019-11-15 10:15:19,165] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: preferred_username / value: esirem / class java.lang.String
DEBUG [2019-11-15 10:15:19,166] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: preferred_username / value: esirem / class java.lang.String
DEBUG [2019-11-15 10:15:19,166] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: iss / value: http://localhost:5000/auth/realms/zeppelin / class java.lang.String
DEBUG [2019-11-15 10:15:19,167] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: iss / value: http://localhost:5000/auth/realms/zeppelin / class java.lang.String
DEBUG [2019-11-15 10:15:19,167] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: typ / value: ID / class java.lang.String
DEBUG [2019-11-15 10:15:19,167] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: typ / value: ID / class java.lang.String
DEBUG [2019-11-15 10:15:19,167] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: nonce / value: 6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM / class java.lang.String
DEBUG [2019-11-15 10:15:19,167] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: nonce / value: 6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM / class java.lang.String
DEBUG [2019-11-15 10:15:19,167] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: aud / value: [zeppelin-client] / class java.util.ArrayList
DEBUG [2019-11-15 10:15:19,168] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: aud / value: [zeppelin-client] / class java.util.ArrayList
DEBUG [2019-11-15 10:15:19,168] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: acr / value: 0 / class java.lang.String
DEBUG [2019-11-15 10:15:19,168] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: acr / value: 0 / class java.lang.String
DEBUG [2019-11-15 10:15:19,168] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: nbf / value: Thu Jan 01 01:00:00 CET 1970 / class java.util.Date
DEBUG [2019-11-15 10:15:19,169] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: nbf / value: Thu Jan 01 01:00:00 CET 1970 / class java.util.Date
DEBUG [2019-11-15 10:15:19,169] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: azp / value: zeppelin-client / class java.lang.String
DEBUG [2019-11-15 10:15:19,169] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: azp / value: zeppelin-client / class java.lang.String
DEBUG [2019-11-15 10:15:19,169] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: auth_time / value: Fri Nov 15 10:14:49 CET 2019 / class java.util.Date
DEBUG [2019-11-15 10:15:19,169] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: auth_time / value: Fri Nov 15 10:14:49 CET 2019 / class java.util.Date
DEBUG [2019-11-15 10:15:19,170] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: exp / value: Fri Nov 15 10:20:19 CET 2019 / class java.util.Date
DEBUG [2019-11-15 10:15:19,170] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: exp / value: Fri Nov 15 10:20:19 CET 2019 / class java.util.Date
DEBUG [2019-11-15 10:15:19,170] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: session_state / value: 2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe / class java.lang.String
DEBUG [2019-11-15 10:15:19,170] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: session_state / value: 2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe / class java.lang.String
DEBUG [2019-11-15 10:15:19,170] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:65) - converted to => key: iat / value: Fri Nov 15 10:15:19 CET 2019 / class java.util.Date
DEBUG [2019-11-15 10:15:19,171] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: iat / value: Fri Nov 15 10:15:19 CET 2019 / class java.util.Date
DEBUG [2019-11-15 10:15:19,171] ({qtp89387388-13} ProfileDefinition.java[convertAndAdd]:69) - no conversion => key: jti / value: 50b55f1b-e9dc-4a65-82ee-f0160fb72b81 / class java.lang.String
DEBUG [2019-11-15 10:15:19,171] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: jti / value: 50b55f1b-e9dc-4a65-82ee-f0160fb72b81 / class java.lang.String
DEBUG [2019-11-15 10:15:19,171] ({qtp89387388-13} UserProfile.java[addAttributeToMap]:86) - adding => key: token_expiration_advance / value: -1 / class java.lang.Integer
DEBUG [2019-11-15 10:15:19,172] ({qtp89387388-13} BaseClient.java[retrieveUserProfile]:114) - profile: #KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:20:19 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:15:19 CET 2019, jti=50b55f1b-e9dc-4a65-82ee-f0160fb72b81} | roles: [] | permissions: [] | isRemembered: false | clientName: null | linkedId: null |
DEBUG [2019-11-15 10:15:19,175] ({qtp89387388-13} DefaultCallbackLogic.java[perform]:93) - profile: #KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:20:19 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:15:19 CET 2019, jti=50b55f1b-e9dc-4a65-82ee-f0160fb72b81} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |
TRACE [2019-11-15 10:15:19,175] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,175] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,175] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,176] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,176] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,176] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,176] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,176] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,177] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,177] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,177] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,177] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,178] ({qtp89387388-13} AbstractAuthenticator.java[authenticate]:194) - Authentication attempt received for token [io.buji.pac4j.token.Pac4jToken@30dd988d]
DEBUG [2019-11-15 10:15:19,178] ({qtp89387388-13} AuthenticatingRealm.java[getAuthenticationInfo]:572) - Looked up AuthenticationInfo [#Pac4jPrincipal# | profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiIwM2I0NTVjMS0wZmFlLTQxYmUtODEwOS03YzIyYmQwMjQwM2EiLCJleHAiOjE1NzM4MDk2MTksIm5iZiI6MCwiaWF0IjoxNTczODA5MzE5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJhY2NvdW50Iiwic3ViIjoiMjNkNDZkY2UtY2NiYi00MWMzLThkZDgtNDlkZGIyOWJiNzRiIiwidHlwIjoiQmVhcmVyIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiI2WXVvdFVjS2xNQTUxaWhSYVZ4aldrMGVQcXRrWjRTVmdwX0VLUDE3U21NIiwiYXV0aF90aW1lIjoxNTczODA5Mjg5LCJzZXNzaW9uX3N0YXRlIjoiMmRjOGY3YzQtYmNjNi00MjQ0LWJlMDQtOGFlYzljYjU5ZWJlIiwiYWNyIjoiMCIsInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJvZmZsaW5lX2FjY2VzcyIsInVtYV9hdXRob3JpemF0aW9uIl19LCJyZXNvdXJjZV9hY2Nlc3MiOnsiemVwcGVsaW4tY2xpZW50Ijp7InJvbGVzIjpbInVzZXIiXX0sImFjY291bnQiOnsicm9sZXMiOlsibWFuYWdlLWFjY291bnQiLCJtYW5hZ2UtYWNjb3VudC1saW5rcyIsInZpZXctcHJvZmlsZSJdfX0sInNjb3BlIjoib3BlbmlkIHByb2ZpbGUgZW1haWwiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:20:19 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:15:19 CET 2019, jti=50b55f1b-e9dc-4a65-82ee-f0160fb72b81} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |] |] from doGetAuthenticationInfo
DEBUG [2019-11-15 10:15:19,179] ({qtp89387388-13} AuthenticatingRealm.java[cacheAuthenticationInfoIfPossible]:510) - AuthenticationInfo caching is disabled for info [#Pac4jPrincipal# | profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:20:19 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:15:19 CET 2019, jti=50b55f1b-e9dc-4a65-82ee-f0160fb72b81} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |] |].  Submitted token: [io.buji.pac4j.token.Pac4jToken@30dd988d].
DEBUG [2019-11-15 10:15:19,182] ({qtp89387388-13} SimpleCredentialsMatcher.java[equals]:96) - Performing credentials equality check for tokenCredentials of type [java.lang.Integer and accountCredentials of type [java.lang.Integer]
DEBUG [2019-11-15 10:15:19,183] ({qtp89387388-13} AbstractAuthenticator.java[authenticate]:233) - Authentication successful for token [io.buji.pac4j.token.Pac4jToken@30dd988d].  Returned account [#Pac4jPrincipal# | profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiI1MGI1NWYxYi1lOWRjLTRhNjUtODJlZS1mMDE2MGZiNzJiODEiLCJleHAiOjE1NzM4MDk2MTksIm5iZiI6MCwiaWF0IjoxNTczODA5MzE5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJ6ZXBwZWxpbi1jbGllbnQiLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJJRCIsImF6cCI6InplcHBlbGluLWNsaWVudCIsIm5vbmNlIjoiNll1b3RVY0tsTUE1MWloUmFWeGpXazBlUHF0a1o0U1ZncF9FS1AxN1NtTSIsImF1dGhfdGltZSI6MTU3MzgwOTI4OSwic2Vzc2lvbl9zdGF0ZSI6IjJkYzhmN2M0LWJjYzYtNDI0NC1iZTA0LThhZWM5Y2I1OWViZSIsImFjciI6IjAiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiIwM2I0NTVjMS0wZmFlLTQxYmUtODEwOS03YzIyYmQwMjQwM2EiLCJleHAiOjE1NzM4MDk2MTksIm5iZiI6MCwiaWF0IjoxNTczODA5MzE5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJhY2NvdW50Iiwic3ViIjoiMjNkNDZkY2UtY2NiYi00MWMzLThkZDgtNDlkZGIyOWJiNzRiIiwidHlwIjoiQmVhcmVyIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiI2WXVvdFVjS2xNQTUxaWhSYVZ4aldrMGVQcXRrWjRTVmdwX0VLUDE3U21NIiwiYXV0aF90aW1lIjoxNTczODA5Mjg5LCJzZXNzaW9uX3N0YXRlIjoiMmRjOGY3YzQtYmNjNi00MjQ0LWJlMDQtOGFlYzljYjU5ZWJlIiwiYWNyIjoiMCIsInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJvZmZsaW5lX2FjY2VzcyIsInVtYV9hdXRob3JpemF0aW9uIl19LCJyZXNvdXJjZV9hY2Nlc3MiOnsiemVwcGVsaW4tY2xpZW50Ijp7InJvbGVzIjpbInVzZXIiXX0sImFjY291bnQiOnsicm9sZXMiOlsibWFuYWdlLWFjY291bnQiLCJtYW5hZ2UtYWNjb3VudC1saW5rcyIsInZpZXctcHJvZmlsZSJdfX0sInNjb3BlIjoib3BlbmlkIHByb2ZpbGUgZW1haWwiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:20:19 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:15:19 CET 2019, jti=50b55f1b-e9dc-4a65-82ee-f0160fb72b81} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |] |]
TRACE [2019-11-15 10:15:19,183] ({qtp89387388-13} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:19,183] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
DEBUG [2019-11-15 10:15:19,184] ({qtp89387388-13} DefaultSecurityManager.java[resolveSession]:441) - Context already contains a session.  Returning.
TRACE [2019-11-15 10:15:19,184] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,184] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,184] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,185] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,185] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,185] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,186] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,186] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,186] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,187] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,187] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,187] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,188] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
TRACE [2019-11-15 10:15:19,188] ({qtp89387388-13} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-15 10:15:19,188] ({qtp89387388-13} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [rememberMe=deleteMe; Path=/; Max-Age=0; Expires=Thu, 14-Nov-2019 09:15:19 GMT]
TRACE [2019-11-15 10:15:19,188] ({qtp89387388-13} SimpleCookie.java[removeFrom]:375) - Removed 'rememberMe' cookie by setting maxAge=0
DEBUG [2019-11-15 10:15:19,189] ({qtp89387388-13} AbstractRememberMeManager.java[onSuccessfulLogin]:290) - AuthenticationToken did not indicate RememberMe is requested.  RememberMe functionality will not be executed for corresponding account.
TRACE [2019-11-15 10:15:19,189] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,189] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,190] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:19,191] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:19,191] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3390c75b
DEBUG [2019-11-15 10:15:19,191] ({qtp89387388-13} DefaultCallbackLogic.java[redirectToOriginallyRequestedUrl]:146) - redirectUrl: http://localhost:8080
TRACE [2019-11-15 10:15:20,373] ({qtp89387388-15} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:20,374] ({qtp89387388-15} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:20,375] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@7e6b1fd3
DEBUG [2019-11-15 10:15:20,375] ({qtp89387388-15} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [eccd494d-6f7e-47f6-8bab-18f44f9d55a7]
TRACE [2019-11-15 10:15:20,375] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,375] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,375] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,376] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,376] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,376] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,376] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,377] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,377] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,377] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,377] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,377] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,389] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,393] ({qtp89387388-15} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,393] ({qtp89387388-15} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,394] ({qtp89387388-15} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,394] ({qtp89387388-15} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,394] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,394] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,394] ({qtp89387388-15} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/**] for requestURI [/api/security/ticket].  Utilizing corresponding filter chain...
TRACE [2019-11-15 10:15:20,394] ({qtp89387388-15} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-15 10:15:20,395] ({qtp89387388-15} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
DEBUG [2019-11-15 10:15:20,395] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:66) - === SECURITY ===
DEBUG [2019-11-15 10:15:20,395] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:91) - url: http://localhost:8080/api/security/ticket
DEBUG [2019-11-15 10:15:20,395] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:92) - matchers: null
DEBUG [2019-11-15 10:15:20,395] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:95) - clients: keycloakOidcClient
DEBUG [2019-11-15 10:15:20,396] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:37) - Provided clientNames: keycloakOidcClient
DEBUG [2019-11-15 10:15:20,396] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:53) - clientNameOnRequest: null
DEBUG [2019-11-15 10:15:20,396] ({qtp89387388-15} DefaultSecurityClientFinder.java[find]:79) - result: [keycloakOidcClient]
DEBUG [2019-11-15 10:15:20,400] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:97) - currentClients: [#KeycloakOidcClient# | name: keycloakOidcClient | callbackUrl: http://localhost:8080/api/callback | callbackUrlResolver: org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@266d1b8e | ajaxRequestResolver: org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@44a72b54 | redirectActionBuilder: org.pac4j.oidc.redirect.OidcRedirectActionBuilder@52eb37e7 | credentialsExtractor: org.pac4j.oidc.credentials.extractor.OidcExtractor@7316a6a7 | authenticator: org.pac4j.oidc.credentials.authenticator.OidcAuthenticator@3d697220 | profileCreator: org.pac4j.oidc.profile.creator.OidcProfileCreator@40e91352 | logoutActionBuilder: org.pac4j.oidc.logout.OidcLogoutActionBuilder@4bb650a7 | authorizationGenerators: [org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@223aa2f7, org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator@d53f4e8] | configuration: #KeycloakOidcConfiguration# | clientId: zeppelin-client | secret: [protected] | discoveryURI: null | scope: openid | customParams: {} | clientAuthenticationMethod: client_secret_basic | useNonce: true | preferredJwsAlgorithm: null | maxAge: null | maxClockSkew: 30 | connectTimeout: 500 | readTimeout: 5000 | resourceRetriever: com.nimbusds.jose.util.DefaultResourceRetriever@7b5d7f10 | responseType: code | responseMode: null | logoutUrl: http://localhost:5000/auth/realms/zeppelin/protocol/openid-connect/logout | withState: false | stateGenerator: org.pac4j.core.state.StaticOrRandomStateGenerator@50ad3bc1 | |]
DEBUG [2019-11-15 10:15:20,401] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:100) - loadProfilesFromSession: true
TRACE [2019-11-15 10:15:20,401] ({qtp89387388-15} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,401] ({qtp89387388-15} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,401] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,401] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
DEBUG [2019-11-15 10:15:20,402] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:103) - profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.UWKMOyAIaDMY9yOym6_09celHj2slMrzgeZ3vIXQfZ07fqdJi36Kz_uzGXHsDlM_UJaNH0EtMPKelWBxmAs6L_Ts7MRqinhCFpyh-IpOCYrli719gb1U4lXW4_hbUBCErAhJARcHE29u-GVu6BEOcBYD2FZP5c5c-YSgBZ6Apq9jX5PQEg_zy32ZgRRxal67Su5BHCzMg8o0DT_SyOk-cFtnY_ctBQIinW_O1lBGYJpAv9i8agzO7MYsho-zN16Me8hIOzPki0xi1UyFiErMOoHKwWTvLcGmWTuQLtCB9rt_0zmUr9LeOhbwHAgkThsWghGsRfzQBCHbmnI9fnthjA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=6YuotUcKlMA51ihRaVxjWk0ePqtkZ4SVgp_EKP17SmM, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.RFGwCiT1JVQo5bM6gcCMw0xy10dcMMfhELDXMEmkvc3ENDDDXfDXCh4SBgwqVRppZAyq5Xyz4Kz1uPyXe5JfufGFL-ooXF5GQWOtG4UW6Xj-DTCv0d8pwldHZuFYVaG9bnQ6cCKWhcWhyzgqK1D0i0hNfNHHmb6dRaksLDxvJorwPAKH7AeKrJPk5-MQO0dn2sxaROJY9FeA300K0XFOclm7Xi1E2870QvqMUSTneykIvIzjmgclGc4NoCdSgz_g6g0WwVOuTDraYRqi3dfLW9OIXuYj47TvuxjdbmG-y7JYoQpUth1HJWK-g5bKKodZ6NQartUTCAiml--hsjdL7w, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.eyJqdGkiOiJmZTZjYTM3Yy1mMDg3LTQyYTAtYTZjMy0yZjk3OWIzOWJjNDIiLCJleHAiOjE1NzM4MTExMTksIm5iZiI6MCwiaWF0IjoxNTczODA5MzE5LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJzdWIiOiIyM2Q0NmRjZS1jY2JiLTQxYzMtOGRkOC00OWRkYjI5YmI3NGIiLCJ0eXAiOiJSZWZyZXNoIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiI2WXVvdFVjS2xNQTUxaWhSYVZ4aldrMGVQcXRrWjRTVmdwX0VLUDE3U21NIiwiYXV0aF90aW1lIjowLCJzZXNzaW9uX3N0YXRlIjoiMmRjOGY3YzQtYmNjNi00MjQ0LWJlMDQtOGFlYzljYjU5ZWJlIiwicmVhbG1fYWNjZXNzIjp7InJvbGVzIjpbIm9mZmxpbmVfYWNjZXNzIiwidW1hX2F1dGhvcml6YXRpb24iXX0sInJlc291cmNlX2FjY2VzcyI6eyJ6ZXBwZWxpbi1jbGllbnQiOnsicm9sZXMiOlsidXNlciJdfSwiYWNjb3VudCI6eyJyb2xlcyI6WyJtYW5hZ2UtYWNjb3VudCIsIm1hbmFnZS1hY2NvdW50LWxpbmtzIiwidmlldy1wcm9maWxlIl19fSwic2NvcGUiOiJvcGVuaWQgcHJvZmlsZSBlbWFpbCJ9.zJejJ0cmVBEzuBMHhJDS2EeiXyENArwEv8MeIeXSrHQ, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:20:19 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:15:19 CET 2019, jti=50b55f1b-e9dc-4a65-82ee-f0160fb72b81} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |]
DEBUG [2019-11-15 10:15:20,402] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:137) - authorizers: null
DEBUG [2019-11-15 10:15:20,402] ({qtp89387388-15} DefaultSecurityLogic.java[perform]:139) - authenticated and authorized -> grant access
TRACE [2019-11-15 10:15:20,403] ({qtp89387388-15} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-15 10:15:20,405] ({qtp89387388-15} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,406] ({qtp89387388-15} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,406] ({qtp89387388-15} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,406] ({qtp89387388-15} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@83ac0df
TRACE [2019-11-15 10:15:20,407] ({qtp89387388-15} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,407] ({qtp89387388-15} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,407] ({qtp89387388-15} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,408] ({qtp89387388-15} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] bound to thread [qtp89387388-15]
TRACE [2019-11-15 10:15:20,838] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:20,838] ({qtp89387388-13} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-15 10:15:20,839] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@36ea6901
DEBUG [2019-11-15 10:15:20,839] ({qtp89387388-13} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [eccd494d-6f7e-47f6-8bab-18f44f9d55a7]
TRACE [2019-11-15 10:15:20,839] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,839] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,839] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,840] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,840] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,840] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,840] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,840] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,840] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,841] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,841] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,841] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,841] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,841] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:20,841] ({qtp89387388-13} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:20,841] ({qtp89387388-13} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-13]
TRACE [2019-11-15 10:15:20,842] ({qtp89387388-13} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-13]
TRACE [2019-11-15 10:15:20,842] ({qtp89387388-13} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-15 10:15:20,842] ({qtp89387388-13} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@22fcf22e
TRACE [2019-11-15 10:15:20,842] ({qtp89387388-13} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/version] for requestURI [/api/version].  Utilizing corresponding filter chain...
TRACE [2019-11-15 10:15:20,842] ({qtp89387388-13} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-15 10:15:20,843] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
TRACE [2019-11-15 10:15:20,843] ({qtp89387388-13} OncePerRequestFilter.java[doFilter]:121) - Filter 'anon' not yet executed.  Executing now.
TRACE [2019-11-15 10:15:20,843] ({qtp89387388-13} PathMatchingFilter.java[pathsMatch]:123) - Attempting to match pattern '/api/version' with current requestURI '/api/version'...
TRACE [2019-11-15 10:15:20,843] ({qtp89387388-13} PathMatchingFilter.java[preHandle]:176) - Current requestURI matches pattern '/api/version'.  Determining filter chain execution...
TRACE [2019-11-15 10:15:20,843] ({qtp89387388-13} PathMatchingFilter.java[isFilterChainContinued]:197) - Filter 'anon' is enabled for the current request under path '/api/version' with config [null].  Delegating to subclass implementation for 'onPreHandle' check.
TRACE [2019-11-15 10:15:20,843] ({qtp89387388-13} AdviceFilter.java[doFilterInternal]:133) - Invoked preHandle method.  Continuing chain?: [true]
TRACE [2019-11-15 10:15:20,844] ({qtp89387388-13} ProxiedFilterChain.java[doFilter]:59) - Invoking original filter chain.
TRACE [2019-11-15 10:15:20,848] ({qtp89387388-13} AdviceFilter.java[doFilterInternal]:142) - Successfully invoked postHandle method
TRACE [2019-11-15 10:15:20,848] ({qtp89387388-13} AdviceFilter.java[cleanup]:174) - Successfully invoked afterCompletion method.

As said before, I am redirected to main page, default url is triggered and my user is logged in again without any promt for credentials (because of stored token).

Best regards,
E.M

Jérôme LELEU

unread,
Nov 15, 2019, 8:35:33 AM11/15/19
to esirem, Pac4j development mailing list
Hi,

The DefaultLogoutLogic is never called, the request is intercepted by the SecurityFilter. There is some misconfiguration in your shiro.ini file, the logout filter should be defined before the security filters.
Thanks.
Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.

esirem

unread,
Nov 15, 2019, 11:12:44 AM11/15/19
to Pac4j development mailing list
Hi,

Indeed, before asking you, I also tried to define the logout filter before the security filters and this does not resolve the issue. However, the behavior on this configuration is different. While pressing the logout button into zeppelin interface the first time nothing happens (contrary to the previous behavior), pressing a second time the logout button, it redirects back to the same page with logged-in user (same previous user connected) and so does not resolve the problem. And I looked the logs, the DefaultLogoutLogic is never called also. Can you tell me more about the importance of order inside the shiro.ini ? 

I have another issue : as I am only able to retrieve roles of users from Keycloak inside the logs, I actually want to use it to restrict permissions inside zeppelin directly. Here the logs showing that the roles has been successfully retrieved from Keycloak (c.f. in red) :

DEBUG [2019-11-15 10:15:16,316] ({qtp89387388-14} DefaultSecurityLogic.java[perform]:103) - profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=vrRrDDSJcSKXzlYL9K8wlo_gKE6NsalNhNgNyrZzdvI, aud=[zeppelin-client], acr=1, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Fri Nov 15 10:14:49 CET 2019, exp=Fri Nov 15 10:19:49 CET 2019, session_state=2dc8f7c4-bcc6-4244-be04-8aec9cb59ebe, iat=Fri Nov 15 10:14:49 CET 2019, jti=48d9d260-ad8b-441b-9e48-505e9fbc67fe} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |].

Because retrieving the roles into the logs is useless if we can only retrieve it from the logs. Maybe there is a configuration for that, but I didn't find it inside the documentation. I thought that the user will be automatically linked to their roles with the KeycloakRolesAuthorizationGenerator.java but it is not.
Assuming that zeppelin relies FULLY on Shiro for his Authentication process, I think that there is a way more dynamic than defining manually by hand inside the shiro.ini as I saw inside the Shiro documentation (https://shiro.apache.org/configuration.html). How can you connect / link each user to their correspondent roles (already retrived from Keycloak) with the shiro.ini configuration ?

[users]

admin = password1, admin
user1 = password2, role1, role2 
user2 = password3, role3 
user3 = password4, role2

And now as I have everything in Keycloak and as I can now retrieve it in the back-end, how to configure it inside the shiro.ini configuration ? I really don't find specific answer into the documentation, especially with Keycloak, the reason why I am solving directly with you the issue. Hope you can debug me on those points. Thanks in advance Jérôme.

Best regards,
E.M

Jérôme LELEU

unread,
Nov 15, 2019, 11:49:54 AM11/15/19
to esirem, Pac4j development mailing list
Hi,

The order matters: this filter: /api/login/logout = logoutFilter should be defined before: /** = oidcSecurityFilter

With this configuration, can you copy/paste the full logs?

If you take a look at the Pac4jRealm, you see that the pac4j roles should be added to the authorization info of Shiro. I tend to think that it should work but I need to check.

Thanks.
Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.

esirem

unread,
Nov 16, 2019, 12:32:21 PM11/16/19
to Pac4j development mailing list
Hi,

Here the logs after defining this filter /api/login/logout = logoutFilter  before this filter /** = oidcSecurityFilter. I actually see the DefaultLogoutLogic been called on those logs when I click on the logout button, but the behavior remains the same. When I click, nothing happens, I 'm still on the same page with the connected user. What I exept is to be back to the Keycloak authentification interface asking for credentials :


TRACE [2019-11-16 16:17:28,400] ({qtp89387388-16} OncePerRequestFilter.java[doFilter]:121) - Filter 'org.apache.shiro.web.servlet.ShiroFilter-17baae6e' not yet executed.  Executing now.
TRACE [2019-11-16 16:17:28,400] ({qtp89387388-16} DefaultSecurityManager.java[ensureSecurityManager]:417) - Context already contains a SecurityManager instance.  Returning.
TRACE [2019-11-16 16:17:28,401] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@4b1abf37
DEBUG [2019-11-16 16:17:28,401] ({qtp89387388-16} SimpleCookie.java[readValue]:389) - Found 'JSESSIONID' cookie value [6b41a0bf-6c53-43d8-8381-3b1ab5aadda1]
TRACE [2019-11-16 16:17:28,401] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,401] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,402] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,402] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,402] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,402] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,403] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,403] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,403] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,403] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,404] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,404] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,404] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,404] ({qtp89387388-16} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] to thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,404] ({qtp89387388-16} ThreadContext.java[put]:169) - Bound value of type [org.apache.shiro.web.mgt.DefaultWebSecurityManager] for key [org.apache.shiro.util.ThreadContext_SECURITY_MANAGER_KEY] to thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,405] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,405] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,405] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,405] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,406] ({qtp89387388-16} PathMatchingFilterChainResolver.java[getChain]:108) - Matched path pattern [/api/login/logout] for requestURI [/api/login/logout].  Utilizing corresponding filter chain...
TRACE [2019-11-16 16:17:28,406] ({qtp89387388-16} AbstractShiroFilter.java[getExecutionChain]:417) - Resolved a configured FilterChain for the current request.
TRACE [2019-11-16 16:17:28,406] ({qtp89387388-16} ProxiedFilterChain.java[doFilter]:64) - Invoking wrapped filter at index [0]
DEBUG [2019-11-16 16:17:28,406] ({qtp89387388-16} DefaultLogoutLogic.java[perform]:44) - === LOGOUT ===
TRACE [2019-11-16 16:17:28,407] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,407] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,407] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,407] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
DEBUG [2019-11-16 16:17:28,408] ({qtp89387388-16} DefaultLogoutLogic.java[perform]:93) - redirectUrl: http://localhost:8080
DEBUG [2019-11-16 16:17:28,408] ({qtp89387388-16} DefaultLogoutLogic.java[perform]:102) - Performing application logout
TRACE [2019-11-16 16:17:28,408] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,408] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,408] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,408] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,409] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,409] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,409] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,409] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,409] ({qtp89387388-16} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-16 16:17:28,410] ({qtp89387388-16} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [rememberMe=deleteMe; Path=/; Max-Age=0; Expires=Fri, 15-Nov-2019 15:17:28 GMT]
TRACE [2019-11-16 16:17:28,410] ({qtp89387388-16} SimpleCookie.java[removeFrom]:375) - Removed 'rememberMe' cookie by setting maxAge=0
TRACE [2019-11-16 16:17:28,410] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,410] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
DEBUG [2019-11-16 16:17:28,411] ({qtp89387388-16} DefaultSecurityManager.java[logout]:559) - Logging out subject with primary principal #Pac4jPrincipal# | profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.DiK3QeG4Nl0yj4FLfnlLNE8JM5QkMRNUAL-1cuji8JM65t1YZ5pDNTcKa5HaM2GkUGlaIzjatsQor3uT7Tbq6LjysBwXTsCoNB3IJogJppy6X-jOp6Wr7GlL4rvGovMsgJj2O9lReYT-bH8u0YLYQQno76dgvHOtyDBc5yrxKZqoQMP5dteF_P4PR7UbPCFXbTfSpdEXpYFfvKYe0c2L83uQ6AUjILIoqNyG290B-kBugGXIwnwFfA1scMO5gHlC-7Wr5BeYzNWxspi9FC76ToMrqjqd0P4Eo2qgpJ5HHKMCS-pSt6MmKj_HUzzZbXXVmSHTbtZUfzx2heXgfokOsA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=hqR-pXndbgNnHrVpGBlcXBExGX1Zwj9-SI0E1t9sLDc, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.eyJqdGkiOiJmZGUzODkyZi0zMzJjLTRiNGItYjNlOC0zZWM5Nzc4YWNmMjIiLCJleHAiOjE1NzM5MTc2NTcsIm5iZiI6MCwiaWF0IjoxNTczOTE3MzU3LCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjUwMDAvYXV0aC9yZWFsbXMvemVwcGVsaW4iLCJhdWQiOiJhY2NvdW50Iiwic3ViIjoiMjNkNDZkY2UtY2NiYi00MWMzLThkZDgtNDlkZGIyOWJiNzRiIiwidHlwIjoiQmVhcmVyIiwiYXpwIjoiemVwcGVsaW4tY2xpZW50Iiwibm9uY2UiOiJocVItcFhuZGJnTm5IclZwR0JsY1hCRXhHWDFad2o5LVNJMEUxdDlzTERjIiwiYXV0aF90aW1lIjoxNTczOTE2ODc4LCJzZXNzaW9uX3N0YXRlIjoiYjU2OWM3N2UtMmE5Yi00ODZiLTk2ODctYjYwYzIyNmYyMGRiIiwiYWNyIjoiMCIsInJlYWxtX2FjY2VzcyI6eyJyb2xlcyI6WyJvZmZsaW5lX2FjY2VzcyIsInVtYV9hdXRob3JpemF0aW9uIl19LCJyZXNvdXJjZV9hY2Nlc3MiOnsiemVwcGVsaW4tY2xpZW50Ijp7InJvbGVzIjpbInVzZXIiXX0sImFjY291bnQiOnsicm9sZXMiOlsibWFuYWdlLWFjY291bnQiLCJtYW5hZ2UtYWNjb3VudC1saW5rcyIsInZpZXctcHJvZmlsZSJdfX0sInNjb3BlIjoib3BlbmlkIHByb2ZpbGUgZW1haWwiLCJlbWFpbF92ZXJpZmllZCI6ZmFsc2UsInByZWZlcnJlZF91c2VybmFtZSI6ImVzaXJlbSJ9.dBSyRQqht4skKZlsfFSM8Lf2P_GrWDHvww4igro6GTC86FPva0Vll7fnW3aedOlVbyvxaeW5HvIMkRKmhVRUA43Wl9BF2NUbsKK_Lzqx3e3ZidJnru82XyvKE16QJEvpX3UWnD3OVwSNQPqoQQYGJbhVzo3UOyzY72JW4AAqqfCPvxXBJ6i1ObKqy03WzFMtmH2sa2fnswtTYNyjplYAYKLRiW1Jpqsr_x14oghDDPhWybBzgydfvJ9KrmJgpWU_6FOD6px6fEP1yTckOzxqjzhsjfItPMPyrFsJ61JWNn0cwyI9ocm0o5OhSzAR3nmiHNJdrMVADFKfakHfxtHz4g, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.USujBRzAA6FMFXOtS0j4pVvwBM71RHi4OCEErPsvqcA, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Sat Nov 16 16:07:58 CET 2019, exp=Sat Nov 16 16:20:57 CET 2019, session_state=b569c77e-2a9b-486b-9687-b60c226f20db, iat=Sat Nov 16 16:15:57 CET 2019, jti=b165ba69-f17b-4db3-ad01-7430fe8cfaed} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |] |
DEBUG [2019-11-16 16:17:28,413] ({qtp89387388-16} AuthorizingRealm.java[getAuthorizationCacheLazy]:234) - No authorizationCache instance set.  Checking for a cacheManager...
DEBUG [2019-11-16 16:17:28,414] ({qtp89387388-16} AuthorizingRealm.java[getAuthorizationCacheLazy]:248) - No cache or cacheManager properties have been set.  Authorization cache cannot be obtained.
TRACE [2019-11-16 16:17:28,414] ({qtp89387388-16} CachingRealm.java[clearCache]:171) - Cleared cache entries for account with principals [#Pac4jPrincipal# | profiles: [#KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.DiK3QeG4Nl0yj4FLfnlLNE8JM5QkMRNUAL-1cuji8JM65t1YZ5pDNTcKa5HaM2GkUGlaIzjatsQor3uT7Tbq6LjysBwXTsCoNB3IJogJppy6X-jOp6Wr7GlL4rvGovMsgJj2O9lReYT-bH8u0YLYQQno76dgvHOtyDBc5yrxKZqoQMP5dteF_P4PR7UbPCFXbTfSpdEXpYFfvKYe0c2L83uQ6AUjILIoqNyG290B-kBugGXIwnwFfA1scMO5gHlC-7Wr5BeYzNWxspi9FC76ToMrqjqd0P4Eo2qgpJ5HHKMCS-pSt6MmKj_HUzzZbXXVmSHTbtZUfzx2heXgfokOsA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=hqR-pXndbgNnHrVpGBlcXBExGX1Zwj9-SI0E1t9sLDc, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.dBSyRQqht4skKZlsfFSM8Lf2P_GrWDHvww4igro6GTC86FPva0Vll7fnW3aedOlVbyvxaeW5HvIMkRKmhVRUA43Wl9BF2NUbsKK_Lzqx3e3ZidJnru82XyvKE16QJEvpX3UWnD3OVwSNQPqoQQYGJbhVzo3UOyzY72JW4AAqqfCPvxXBJ6i1ObKqy03WzFMtmH2sa2fnswtTYNyjplYAYKLRiW1Jpqsr_x14oghDDPhWybBzgydfvJ9KrmJgpWU_6FOD6px6fEP1yTckOzxqjzhsjfItPMPyrFsJ61JWNn0cwyI9ocm0o5OhSzAR3nmiHNJdrMVADFKfakHfxtHz4g, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.USujBRzAA6FMFXOtS0j4pVvwBM71RHi4OCEErPsvqcA, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Sat Nov 16 16:07:58 CET 2019, exp=Sat Nov 16 16:20:57 CET 2019, session_state=b569c77e-2a9b-486b-9687-b60c226f20db, iat=Sat Nov 16 16:15:57 CET 2019, jti=b165ba69-f17b-4db3-ad01-7430fe8cfaed} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |] |]
TRACE [2019-11-16 16:17:28,415] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,415] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,416] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
TRACE [2019-11-16 16:17:28,416] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = false; session is null = false; session has id = true
TRACE [2019-11-16 16:17:28,416] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@3d5930f4
DEBUG [2019-11-16 16:17:28,417] ({qtp89387388-16} AbstractNativeSessionManager.java[stop]:284) - Stopping session with id [6b41a0bf-6c53-43d8-8381-3b1ab5aadda1]
DEBUG [2019-11-16 16:17:28,417] ({qtp89387388-16} DefaultWebSessionManager.java[onStop]:314) - Session has been stopped (subject logout or explicit stop).  Removing session ID cookie.
TRACE [2019-11-16 16:17:28,420] ({qtp89387388-16} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-16 16:17:28,421] ({qtp89387388-16} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [JSESSIONID=deleteMe; Path=/; Max-Age=0; Expires=Fri, 15-Nov-2019 15:17:28 GMT]
TRACE [2019-11-16 16:17:28,421] ({qtp89387388-16} SimpleCookie.java[removeFrom]:375) - Removed 'JSESSIONID' cookie by setting maxAge=0
DEBUG [2019-11-16 16:17:28,434] ({qtp89387388-16} DefaultLogoutLogic.java[perform]:119) - Performing central logout
DEBUG [2019-11-16 16:17:28,434] ({qtp89387388-16} DefaultLogoutLogic.java[perform]:121) - Profile: #KeycloakOidcProfile# | id: 23d46dce-ccbb-41c3-8dd8-49ddb29bb74b | attributes: {sub=23d46dce-ccbb-41c3-8dd8-49ddb29bb74b, email_verified=false, id_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.DiK3QeG4Nl0yj4FLfnlLNE8JM5QkMRNUAL-1cuji8JM65t1YZ5pDNTcKa5HaM2GkUGlaIzjatsQor3uT7Tbq6LjysBwXTsCoNB3IJogJppy6X-jOp6Wr7GlL4rvGovMsgJj2O9lReYT-bH8u0YLYQQno76dgvHOtyDBc5yrxKZqoQMP5dteF_P4PR7UbPCFXbTfSpdEXpYFfvKYe0c2L83uQ6AUjILIoqNyG290B-kBugGXIwnwFfA1scMO5gHlC-7Wr5BeYzNWxspi9FC76ToMrqjqd0P4Eo2qgpJ5HHKMCS-pSt6MmKj_HUzzZbXXVmSHTbtZUfzx2heXgfokOsA, iss=http://localhost:5000/auth/realms/zeppelin, typ=ID, preferred_username=esirem, nonce=hqR-pXndbgNnHrVpGBlcXBExGX1Zwj9-SI0E1t9sLDc, access_token=eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJyRG51S0NjVEFoalZUelZSaGtTTnhBaEhaeUtmS2JQQ3pmZUpnbmp3RkxBIn0.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.dBSyRQqht4skKZlsfFSM8Lf2P_GrWDHvww4igro6GTC86FPva0Vll7fnW3aedOlVbyvxaeW5HvIMkRKmhVRUA43Wl9BF2NUbsKK_Lzqx3e3ZidJnru82XyvKE16QJEvpX3UWnD3OVwSNQPqoQQYGJbhVzo3UOyzY72JW4AAqqfCPvxXBJ6i1ObKqy03WzFMtmH2sa2fnswtTYNyjplYAYKLRiW1Jpqsr_x14oghDDPhWybBzgydfvJ9KrmJgpWU_6FOD6px6fEP1yTckOzxqjzhsjfItPMPyrFsJ61JWNn0cwyI9ocm0o5OhSzAR3nmiHNJdrMVADFKfakHfxtHz4g, token_expiration_advance=-1, refresh_token=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICIwMmQ3ZGIxZi1iOTNjLTRlOGMtYTY5MC0zOWE5OGM0NjM0ZWMifQ.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.USujBRzAA6FMFXOtS0j4pVvwBM71RHi4OCEErPsvqcA, aud=[zeppelin-client], acr=0, nbf=Thu Jan 01 01:00:00 CET 1970, azp=zeppelin-client, auth_time=Sat Nov 16 16:07:58 CET 2019, exp=Sat Nov 16 16:20:57 CET 2019, session_state=b569c77e-2a9b-486b-9687-b60c226f20db, iat=Sat Nov 16 16:15:57 CET 2019, jti=b165ba69-f17b-4db3-ad01-7430fe8cfaed} | roles: [offline_access, uma_authorization, user] | permissions: [] | isRemembered: false | clientName: keycloakOidcClient | linkedId: null |
TRACE [2019-11-16 16:17:28,437] ({qtp89387388-16} ThreadContext.java[get]:126) - get() - in thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,437] ({qtp89387388-16} ThreadContext.java[get]:133) - Retrieved value of type [org.apache.shiro.web.subject.support.WebDelegatingSubject] for key [org.apache.shiro.util.ThreadContext_SUBJECT_KEY] bound to thread [qtp89387388-16]
TRACE [2019-11-16 16:17:28,438] ({qtp89387388-16} DelegatingSubject.java[getSession]:321) - attempting to get session; create = true; session is null = true; session has id = false
TRACE [2019-11-16 16:17:28,438] ({qtp89387388-16} DelegatingSubject.java[getSession]:338) - Starting session for host 127.0.0.1
TRACE [2019-11-16 16:17:28,438] ({qtp89387388-16} DefaultSessionManager.java[doCreateSession]:156) - Creating session for host 127.0.0.1
DEBUG [2019-11-16 16:17:28,438] ({qtp89387388-16} DefaultSessionManager.java[create]:175) - Creating new EIS record for new session instance [org.apache.shiro.session.mgt.SimpleSession,id=null]
TRACE [2019-11-16 16:17:28,444] ({qtp89387388-16} SimpleCookie.java[calculatePath]:199) - calculated path: /
DEBUG [2019-11-16 16:17:28,444] ({qtp89387388-16} SimpleCookie.java[addCookieHeader]:226) - Added HttpServletResponse Cookie [JSESSIONID=5d8d5ac6-2cfa-4b5a-8655-8d7f1a67b92b; Path=/; HttpOnly]
TRACE [2019-11-16 16:17:28,445] ({qtp89387388-16} DefaultWebSessionManager.java[storeSessionId]:101) - Set session ID cookie for session with id 5d8d5ac6-2cfa-4b5a-8655-8d7f1a67b92b
TRACE [2019-11-16 16:17:28,445] ({qtp89387388-16} AbstractValidatingSessionManager.java[doGetSession]:116) - Attempting to retrieve session with key org.apache.shiro.web.session.mgt.WebSessionKey@6a455f94
DEBUG [2019-11-16 16:17:28,451] ({qtp89387388-16} AbstractExceptionAwareLogic.java[handleException]:41) - extra HTTP action required in security: 403

Here back the latest shiro.ini, I am working with ;

[main]
roleAdminAuthGenerator = org.pac4j.oidc.authorization.generator.KeycloakRolesAuthorizationGenerator

oidcConfig = org.pac4j.oidc.config.KeycloakOidcConfiguration
oidcConfig.baseUri = http://localhost:5000/auth
oidcConfig.clientId = zeppelin-client
oidcConfig.secret = 04814074-86aa-43dd-80ec-c9b1977573eb
oidcConfig.realm = zeppelin
oidcConfig.clientAuthenticationMethodAsString = client_secret_basic
oidcConfig.scope = openid
oidcConfig.useNonce = true
oidcConfig.responseType = code
keycloakOidcClient = org.pac4j.oidc.client.KeycloakOidcClient
keycloakOidcClient.name = keycloakOidcClient
keycloakOidcClient.configuration = $oidcConfig
keycloakOidcClient.authorizationGenerator = $roleAdminAuthGenerator

clients = org.pac4j.core.client.Clients
clients.clients = $keycloakOidcClient

requireRoleAdmin = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
requireRoleAdmin.elements = admin_role
requireRoleUser = org.pac4j.core.authorization.authorizer.RequireAnyRoleAuthorizer
requireRoleUser.elements = admin_role, user_role

config = org.pac4j.core.config.Config
config.clients = $clients
config.authorizers = admin:$requireRoleAdmin,user:$requireRoleUser

pac4jRealm = io.buji.pac4j.realm.Pac4jRealm
pac4jRealm.principalNameAttribute=preferred_username
pac4jSubjectFactory = io.buji.pac4j.subject.Pac4jSubjectFactory

sessionManager = org.apache.shiro.web.session.mgt.DefaultWebSessionManager
securityManager.realms = $pac4jRealm
securityManager.subjectFactory = $pac4jSubjectFactory
securityManager.sessionManager = $sessionManager
securityManager.sessionManager.globalSessionTimeout = 86400000

oidcSecurityFilter = io.buji.pac4j.filter.SecurityFilter
oidcSecurityFilter.config = $config
oidcSecurityFilter.clients = keycloakOidcClient

callbackFilter = io.buji.pac4j.filter.CallbackFilter
callbackFilter.defaultUrl = http://localhost:8080
callbackFilter.config = $config

logoutFilter = io.buji.pac4j.filter.LogoutFilter
logoutFilter.defaultUrl = http://localhost:8080
logoutFilter.localLogout = true
logoutFilter.centralLogout = true
logoutFilter.config = $config

[roles]

[urls]
/api/version = anon
/api/callback = callbackFilter
/api/login/logout = logoutFilter
/** = oidcSecurityFilter

And about the roles issue, I checked the pac4jRealm.java and the KeycloakRolesAuthorizationGenerator.java, and I see that you are adding roles, but on my side it is not working. Can you check it on your side ?

Thanks,
Best regards,
E.M

esirem

unread,
Nov 18, 2019, 9:02:54 AM11/18/19
to Pac4j development mailing list
Hi Jérôme,

Here some more information on the roles management issue.
As I said above, with the Keycloak configuration, I can only retrieve the roles information from the logs but not inside the browser. The ticket (/api/security/ticket) showing the following response : 

{"status":"OK","message":"","body":{"principal":"esirem","ticket":"702ac716-d5e3-4a6f-9527-70c6f61ae538","roles":"[]"}}

The roles are completely empty inside the browser, so as it is empty, I cannot manipulate it into zeppelin.

roles_empty.PNG


If you can directly test it with zeppelin and check it, I believe that it will be a gain of time.



Thanks,
Best regards,
E.M

esirem

unread,
Nov 21, 2019, 8:19:13 AM11/21/19
to Pac4j development mailing list
Hi Jérôme,

Still facing the issue, any help is appreciated. 

I have some more implementation on how Zeppelin Server manipulating Security API Rest. Here the links of the "zeppelin-server" coded in Java implementing the Shiro Authentification Service for retrieving information : 
And here the method they are calling :

For instance, this getPrincipal() method actually works, the reason why I can successfully retrieve the name of the user.

public String getPrincipal() {
Subject subject = org.apache.shiro.SecurityUtils.getSubject();
String principal;
if (subject.isAuthenticated()) {
principal = extractPrincipal(subject);
if (conf.isUsernameForceLowerCase()) {
LOGGER.debug("Converting principal name " + principal
+ " to lower case:" + principal.toLowerCase());
principal = principal.toLowerCase();
}
} else {
// TODO(jl): Could be better to occur error?
principal = "anonymous";
}
return principal;
}
private String extractPrincipal(Subject subject) {
String principal;
Object principalObject = subject.getPrincipal();
if (principalObject instanceof Principal) {
principal = ((Principal) principalObject).getName();
} else {
principal = String.valueOf(principalObject);
}
return principal;
}

The problem is that I cannot retrieve roles from Keycloak. Is it because "zeppelin server" is not implementing correctly the retrieving process specifically for Keycloak ?  Here the getAssociatedRoles() method : 


public Set<String> getAssociatedRoles() {
Subject subject = org.apache.shiro.SecurityUtils.getSubject();
HashSet<String> roles = new HashSet<>();
Map allRoles = null;
if (subject.isAuthenticated()) {
Collection realmsList = getRealmsList();
for (Iterator<Realm> iterator = realmsList.iterator(); iterator.hasNext(); ) {
Realm realm = iterator.next();
String name = realm.getClass().getName();
if (name.equals("org.apache.shiro.realm.text.IniRealm")) {
allRoles = ((IniRealm) realm).getIni().get("roles");
break;
} else if (name.equals("org.apache.zeppelin.realm.LdapRealm")) {
try {
AuthorizationInfo auth =
((LdapRealm) realm)
.queryForAuthorizationInfo(
new SimplePrincipalCollection(subject.getPrincipal(), realm.getName()),
((LdapRealm) realm).getContextFactory());
if (auth != null) {
roles = new HashSet<>(auth.getRoles());
}
} catch (NamingException e) {
LOGGER.error("Can't fetch roles", e);
}
break;
} else if (name.equals("org.apache.zeppelin.realm.ActiveDirectoryGroupRealm")) {
allRoles = ((ActiveDirectoryGroupRealm) realm).getListRoles();
break;
}
}
if (allRoles != null) {
Iterator it = allRoles.entrySet().iterator();
while (it.hasNext()) {
Map.Entry pair = (Map.Entry) it.next();
if (subject.hasRole((String) pair.getKey())) {
roles.add((String) pair.getKey());
}
}
}
}
return roles;
}


And in parallel, I tested your buji-pac4j-demo, and yes it works, the entire profile information is retrieved from the Keycloak, and you use this code for that : 


<%@page import="org.apache.shiro.SecurityUtils"%>
<%@ page import="org.pac4j.core.profile.CommonProfile" %>
<%@ page import="java.util.List" %>
<%@ page import="io.buji.pac4j.subject.Pac4jPrincipal" %>
<%
final Pac4jPrincipal principal = SecurityUtils.getSubject().getPrincipals().oneByType(Pac4jPrincipal.class);
List<CommonProfile> profiles = null;
if (principal != null) {
profiles = principal.getProfiles();
}
%>
<h1>protected area</h1>
<a href="..">Back</a><br />
<br /><br />
profiles: <%=profiles%>

Can you just explain me, why the code below ShiroAuthenticationService.java and his method getAssociatedRoles() seems to not give a response ? What was actually the difference between your demo and zeppelin-server 

Thanks,
Best regards,
E.M

Jérôme LELEU

unread,
Nov 22, 2019, 3:24:31 AM11/22/19
to esirem, Pac4j development mailing list
Hi,

This is much better, the `DefaultLogoutLogic` actually kicks in. I'm surprised not to see the log: "Logout action: XX", but: "extra HTTP action required in security: 403".

I think it's the issue: the request is an AJAX one and the redirection to the logout URL is not performed.

Thanks.
Best regards,
Jérôme

--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.

Jérôme LELEU

unread,
Nov 22, 2019, 3:32:56 AM11/22/19
to esirem, Pac4j development mailing list
Hi,

As long as it woks in pac4j/Shiro, you should ask the Zeppelin community.
Thanks.
Best regards,
Jérôme


--
You received this message because you are subscribed to the Google Groups "Pac4j development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-dev+...@googlegroups.com.
Reply all
Reply to author
Forward
0 new messages