Re: The svn command failed ... Server certificate verification failed: issuer is not trusted

2007-10-12 Thread Bill Brown

Greetings:  

here is a clip from the logs:  

85479675 [defaultScheduler_Worker-13] INFO 
org.apache.maven.continuum.build.set
tings.SchedulesActivator:default  - > Executing build
job (D
EFAULT_SCHEDULE)...
85479720 [defaultScheduler_Worker-13] INFO 
org.apache.maven.continuum.Continuum
:default  - Enqueuing 'emap' (Build definition id=7).
85479726 [pool-1-thread-1] INFO 
org.apache.maven.continuum.buildcontroller.Buil
dController:default  - Initializing build
85479742 [pool-1-thread-1] INFO 
org.apache.maven.continuum.buildcontroller.Buil
dController:default  - Starting build of emap
85479807 [pool-1-thread-1] INFO 
org.apache.maven.continuum.buildcontroller.Buil
dController:default  - Updating working dir
85479808 [pool-1-thread-1] INFO 
org.apache.maven.continuum.buildcontroller.Buil
dController:default  - Performing action check-working-directory
85479814 [pool-1-thread-1] INFO 
org.apache.maven.continuum.buildcontroller.Buil
dController:default  - Performing action checkout-project
85479820 [pool-1-thread-1] INFO 
org.apache.maven.continuum.scm.ContinuumScm:def
ault  - Checking out project: 'emap', id: '7' to
'/opt/continuum-1.1-beta-3/apps
/continuum/webapp/WEB-INF/working-directory/7'.
85479896 [pool-1-thread-1] INFO 
org.apache.maven.scm.manager.ScmManager:default
  - Executing: /bin/sh -c "cd
/opt/continuum-1.1-beta-3/apps/continuum/webapp/WE
B-INF/working-directory && svn --username continuum --non-interactive
checkout h
ttps://localhost/repo/emap/trunk 7"
85479898 [pool-1-thread-1] INFO 
org.apache.maven.scm.manager.ScmManager:default
  - Working directory:
/opt/continuum-1.1-beta-3/apps/continuum/webapp/WEB-INF/w
orking-directory
85480114 [pool-1-thread-1] WARN 
org.apache.maven.continuum.scm.ContinuumScm:def
ault  - Error while checking out the code for project: 'emap', id: '7' to
'/opt/
continuum-1.1-beta-3/apps/continuum/webapp/WEB-INF/working-directory/7'.
85480114 [pool-1-thread-1] WARN 
org.apache.maven.continuum.scm.ContinuumScm:def
ault  - Command output: svn: PROPFIND request failed on '/repo/emap/trunk'
svn: PROPFIND of '/repo/emap/trunk': Server certificate verification failed:
iss
uer is not trusted (https://localhost)

85480114 [pool-1-thread-1] WARN 
org.apache.maven.continuum.scm.ContinuumScm:def
ault  - Provider message: The svn command failed.
85480184 [pool-1-thread-1] INFO 
org.apache.maven.continuum.buildcontroller.Buil
dController:default  - Merging SCM results
85480232 [pool-1-thread-1] INFO 
org.apache.maven.continuum.buildcontroller.Buil
dController:default  - Error updating from SCM, not building

I can tell I am running as the continuum user by invoking:
[EMAIL PROTECTED]:~$ ps -u continuum
  PID TTY  TIME CMD
12119 ?00:00:35 wrapper
12121 ?00:08:57 java

Let me know if I can send along anything else.  

Thanks for your help. 
Bill. 


Emmanuel Venisse wrote:
> 
> can you paste your continuum logs too?
> 
> Are you sure you run continuum with the continuum user because this svn
> output is generally printed when the certificate isn't registered in the
> svn registry.
> 
> Emmanuel
> 
> Bill Brown a écrit :
>> Greetings: 
>> 
>> I am trying to use continuum-1.1-beta-3 with jdk java-6-sun-1.6.0.03 on
>> Ubuntu Linux.  
>> 
>> After adding a maven2 pom, I get the following error when trying to
>> build:
>> 
>> Provider message: The svn command failed.
>> Command output: 
>> ---
>> svn: PROPFIND request failed on '/repo/project/trunk'
>> svn: PROPFIND of '/repo/project/trunk': Server certificate verification
>> failed: issuer is not trusted (https://localhost)
>> 
>> I run the continuum server with a user named continuum. 
>> 
>> I can manually run (as the continuum user) from the command line: 'svn
>> list
>> https://localhost/repo/project/trunk' and get a listing of the contents
>> of
>> the project/trunk.  The first time I ran this I was prompted to
>> permenantly
>> accept the certificate which I did.  
>> 
>> I have a copy of the cert in the continuum users home directory .keystore
>> file.  
>> 
>> Am I missing some other command to run to get continuum to recognize the
>> https://localhost certificate?  
>> 
>> Thanks for your help.
>> Bill. 
>> 
> 
> 
> 

-- 
View this message in context: 
http://www.nabble.com/The-svn-command-failed-...-Server-certificate-verification-failed%3A-issuer-is-not-trusted-tf4611163.html#a13185702
Sent from the Continuum - Users mailing list archive at Nabble.com.



Re: 1.1-beta-3 LDAP

2007-10-12 Thread Jesse McConnell
that is some great feedback, I was looking for something to wedge things
into a real environment and get some information.

thanks!

jesse

On 10/12/07, ossi petz <[EMAIL PROTECTED]> wrote:
>
> hallo
>
> hopefully this does not end up in thread-stealing...
> i'd like to provide some ldap feedback on beta-3 too.
>
> i've managed to configred authentication against our active directory.
> users can login to continuum. thats already something!
>
> so lets switch quickly to the problems part :)
>
> documentation. if this should be tested give people more than a dead
> link in applicaiton.xml:
>
> http://svn.codehaus.org/plexus/plexus-redback/trunk/redback-site/src/site/apt/integration/ldap.apt
>
> as mentiond by bryan madsen there is a requirement for a guest account.
> please remove that one. a guest is a guest. so no authentication against
> any other system should be required. there a billions of guest auth
> requests against the ldap server that serve no purpose.
>
> the security.properties contains the name of an admin. this user can see
> all project groups in continuum. any other user seems to be equal to a
> guest. when i try to edit a user only the users admin and guest exist.
> both from continuum, none of these  are ldap accounts.
> so i cant reconfigure project access rights for ldap users at the moment?
> also the created admin account in continuum does no longer work. i would
> like some fallback authentication: if a user is not found in ldap try in
> local database. we often have external users we dont create in our
> active directory as they only need access to certain tools (bugzilla,
> continuum, etc). in bugzilla this can be configured (ldap only, local
> only, ldap->local, local->ldap). i did like that feature very much.
>
> notifications cannot be assigned to ldap users (well those may never
> where assigned to continuum accounts anyway? not sure).
>
> usernames with special characters (mmüller, tkühn) cause a server error
> (stacktrace see below). the user mmüller can login with 'mmuller', after
> that the username 'mmüller' appears in the logged in bar :)
>
> usernames that are not found in ldap cause a 500 server error too.
>
>
> thats about my report. if you require any mor information please tell :)
>
> thanks for doing ldap integration!
>
>
> regards
>
> ossi
>
>
>
>
> Stacktrace for special usernames:
> Oct 12, 2007 4:20:36 PM org.mortbay.jetty.servlet.ServletHandler handle
> WARNING: /continuum/security/login.action:
> java.lang.NullPointerException
>  at
>
> org.codehaus.plexus.redback.authentication.users.UserManagerAuthenticator.authenticate
> (UserManagerAuthenticator.java:85)
>  at
>
> org.codehaus.plexus.redback.authentication.DefaultAuthenticationManager.authenticate
> (DefaultAuthenticationManager.java:74)
>  at
> org.codehaus.plexus.redback.system.DefaultSecuritySystem.authenticate(
> DefaultSecuritySystem.java:98)
>  at
> org.codehaus.plexus.redback.xwork.action.LoginAction.webLogin(
> LoginAction.java:317)
>  at
> org.codehaus.plexus.redback.xwork.action.LoginAction.login(
> LoginAction.java:130)
>  at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>  at
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java
> :39)
>  at
> sun.reflect.DelegatingMethodAccessorImpl.invoke(
> DelegatingMethodAccessorImpl.java:25)
>  at java.lang.reflect.Method.invoke(Method.java:597)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invokeAction(
> DefaultActionInvocation.java:358)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invokeActionOnly(
> DefaultActionInvocation.java:218)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invoke(
> DefaultActionInvocation.java:192)
>  at
>
> org.codehaus.plexus.redback.xwork.interceptor.SecureActionInterceptor.intercept
> (SecureActionInterceptor.java:114)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invoke(
> DefaultActionInvocation.java:190)
>  at
>
> org.codehaus.plexus.redback.xwork.interceptor.PolicyEnforcementInterceptor.intercept
> (PolicyEnforcementInterceptor.java:100)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invoke(
> DefaultActionInvocation.java:190)
>  at
>
> org.codehaus.plexus.redback.xwork.interceptor.AutoLoginInterceptor.intercept
> (AutoLoginInterceptor.java:156)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invoke(
> DefaultActionInvocation.java:190)
>  at
>
> org.codehaus.plexus.redback.xwork.interceptor.ForceAdminUserInterceptor.intercept
> (ForceAdminUserInterceptor.java:76)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invoke(
> DefaultActionInvocation.java:190)
>  at
>
> org.codehaus.plexus.redback.xwork.interceptor.EnvironmentCheckInterceptor.intercept
> (EnvironmentCheckInterceptor.java:122)
>  at
> com.opensymphony.xwork.DefaultActionInvocation.invoke(
> Defa

Re: 1.1-beta-3 LDAP

2007-10-12 Thread ossi petz

hallo

hopefully this does not end up in thread-stealing...
i'd like to provide some ldap feedback on beta-3 too.

i've managed to configred authentication against our active directory. 
users can login to continuum. thats already something!


so lets switch quickly to the problems part :)

documentation. if this should be tested give people more than a dead 
link in applicaiton.xml:

http://svn.codehaus.org/plexus/plexus-redback/trunk/redback-site/src/site/apt/integration/ldap.apt

as mentiond by bryan madsen there is a requirement for a guest account. 
please remove that one. a guest is a guest. so no authentication against 
any other system should be required. there a billions of guest auth 
requests against the ldap server that serve no purpose.


the security.properties contains the name of an admin. this user can see 
all project groups in continuum. any other user seems to be equal to a 
guest. when i try to edit a user only the users admin and guest exist. 
both from continuum, none of these  are ldap accounts.

so i cant reconfigure project access rights for ldap users at the moment?
also the created admin account in continuum does no longer work. i would 
like some fallback authentication: if a user is not found in ldap try in 
local database. we often have external users we dont create in our 
active directory as they only need access to certain tools (bugzilla, 
continuum, etc). in bugzilla this can be configured (ldap only, local 
only, ldap->local, local->ldap). i did like that feature very much.


notifications cannot be assigned to ldap users (well those may never 
where assigned to continuum accounts anyway? not sure).


usernames with special characters (mmüller, tkühn) cause a server error 
(stacktrace see below). the user mmüller can login with 'mmuller', after 
that the username 'mmüller' appears in the logged in bar :)


usernames that are not found in ldap cause a 500 server error too.


thats about my report. if you require any mor information please tell :)

thanks for doing ldap integration!


regards

ossi




Stacktrace for special usernames:
Oct 12, 2007 4:20:36 PM org.mortbay.jetty.servlet.ServletHandler handle
WARNING: /continuum/security/login.action:
java.lang.NullPointerException
at 
org.codehaus.plexus.redback.authentication.users.UserManagerAuthenticator.authenticate(UserManagerAuthenticator.java:85)
at 
org.codehaus.plexus.redback.authentication.DefaultAuthenticationManager.authenticate(DefaultAuthenticationManager.java:74)
at 
org.codehaus.plexus.redback.system.DefaultSecuritySystem.authenticate(DefaultSecuritySystem.java:98)
at 
org.codehaus.plexus.redback.xwork.action.LoginAction.webLogin(LoginAction.java:317)
at 
org.codehaus.plexus.redback.xwork.action.LoginAction.login(LoginAction.java:130)

at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)

at java.lang.reflect.Method.invoke(Method.java:597)
at 
com.opensymphony.xwork.DefaultActionInvocation.invokeAction(DefaultActionInvocation.java:358)
at 
com.opensymphony.xwork.DefaultActionInvocation.invokeActionOnly(DefaultActionInvocation.java:218)
at 
com.opensymphony.xwork.DefaultActionInvocation.invoke(DefaultActionInvocation.java:192)
at 
org.codehaus.plexus.redback.xwork.interceptor.SecureActionInterceptor.intercept(SecureActionInterceptor.java:114)
at 
com.opensymphony.xwork.DefaultActionInvocation.invoke(DefaultActionInvocation.java:190)
at 
org.codehaus.plexus.redback.xwork.interceptor.PolicyEnforcementInterceptor.intercept(PolicyEnforcementInterceptor.java:100)
at 
com.opensymphony.xwork.DefaultActionInvocation.invoke(DefaultActionInvocation.java:190)
at 
org.codehaus.plexus.redback.xwork.interceptor.AutoLoginInterceptor.intercept(AutoLoginInterceptor.java:156)
at 
com.opensymphony.xwork.DefaultActionInvocation.invoke(DefaultActionInvocation.java:190)
at 
org.codehaus.plexus.redback.xwork.interceptor.ForceAdminUserInterceptor.intercept(ForceAdminUserInterceptor.java:76)
at 
com.opensymphony.xwork.DefaultActionInvocation.invoke(DefaultActionInvocation.java:190)
at 
org.codehaus.plexus.redback.xwork.interceptor.EnvironmentCheckInterceptor.intercept(EnvironmentCheckInterceptor.java:122)
at 
com.opensymphony.xwork.DefaultActionInvocation.invoke(DefaultActionInvocation.java:190)
at 
com.opensymphony.xwork.interceptor.DefaultWorkflowInterceptor.doIntercept(DefaultWorkflowInterceptor.java:175)
at 
com.opensymphony.xwork.interceptor.MethodFilterInterceptor.intercept(MethodFilterInterceptor.java:86)
at 
com.opensymphony.xwork.DefaultActionInvocation.invoke(DefaultActionInvocation.java:190)
at 
com.opensymphony.xwork.validator.ValidationI

Re: 1.1-beta-3 LDAP

2007-10-12 Thread Jesse McConnell
redback requires a guest to exist for authorization purposes..

however the guest doesn't need to have any roles assigned to it.

I would recommend just pointing the guest as some utility user in ldap and
not give it any additional privileges..

we are looking at removing this guest user requirement in later version of
redback, but that will be a while.

jesse

On 10/1/07, Madsen,Bryan <[EMAIL PROTECTED]> wrote:
>
> We do not allow guest accounts on our LDAP server. If I remove the '
> redback.default.guest' configuration I see this exception below. Is there
> a way to bypass that?
>
> I would like all users with an LDAP sign-on to be considered a registered
> user once signed in and then administer their access rights at that point.
>
> 69711 [SocketListener0-1] ERROR
> com.opensymphony.webwork.dispatcher.DispatcherUtils  - Could not find
> action
> Caught Exception while registering Interceptor class
> redbackEnvironmentCheckInterceptor - Class:
> org.codehaus.plexus.redback.xwork.checks.security.GuestUserEnvironmentCheck
> File: GuestUserEnvironmentCheck.java
> Method: validateEnvironment
> Line: 100 -
> org/codehaus/plexus/redback/xwork/checks/security/GuestUserEnvironmentCheck.java:100:-1
> at org.codehaus.plexus.xwork.PlexusObjectFactory.buildInterceptor(
> PlexusObjectFactory.java:152)
> at
> com.opensymphony.xwork.config.providers.InterceptorBuilder.constructInterceptorReference
> (InterceptorBuilder.java:56)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.lookupInterceptorReference
> (XmlConfigurationProvider.java:701)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.loadInterceptorStack
> (XmlConfigurationProvider.java:568)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.loadInterceptorStacks
> (XmlConfigurationProvider.java:581)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.loadInterceptors
> (XmlConfigurationProvider.java:602)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.addPackage
> (XmlConfigurationProvider.java:204)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.loadConfigurationFile
> (XmlConfigurationProvider.java:675)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.loadConfigurationFile
> (XmlConfigurationProvider.java:678)
> at
> com.opensymphony.xwork.config.providers.XmlConfigurationProvider.init(
> XmlConfigurationProvider.java:91)
> at com.opensymphony.xwork.config.impl.DefaultConfiguration.reload(
> DefaultConfiguration.java:86)
> at
> com.opensymphony.xwork.config.ConfigurationManager.getConfiguration(
> ConfigurationManager.java:55)
> at com.opensymphony.xwork.DefaultActionProxy.(
> DefaultActionProxy.java:60)
> at
> com.opensymphony.xwork.DefaultActionProxyFactory.createActionProxy(
> DefaultActionProxyFactory.java:46)
> at
> com.opensymphony.webwork.dispatcher.DispatcherUtils.serviceAction(
> DispatcherUtils.java:264)
> at com.opensymphony.webwork.dispatcher.FilterDispatcher.doFilter(
> FilterDispatcher.java:202)
> at
> org.mortbay.jetty.servlet.WebApplicationHandler$CachedChain.doFilter(
> WebApplicationHandler.java:821)
> at com.opensymphony.module.sitemesh.filter.PageFilter.parsePage(
> PageFilter.java:118)
> at com.opensymphony.module.sitemesh.filter.PageFilter.doFilter(
> PageFilter.java:52)
> at
> org.mortbay.jetty.servlet.WebApplicationHandler$CachedChain.doFilter(
> WebApplicationHandler.java:821)
> at
> com.opensymphony.webwork.dispatcher.ActionContextCleanUp.doFilter(
> ActionContextCleanUp.java:88)
> at
> org.mortbay.jetty.servlet.WebApplicationHandler$CachedChain.doFilter(
> WebApplicationHandler.java:821)
> at org.mortbay.jetty.servlet.WebApplicationHandler.dispatch(
> WebApplicationHandler.java:471)
> at org.mortbay.jetty.servlet.ServletHandler.handle(
> ServletHandler.java:568)
> at org.mortbay.http.HttpContext.handle(HttpContext.java:1530)
> at org.mortbay.jetty.servlet.WebApplicationContext.handle(
> WebApplicationContext.java:633)
> at org.mortbay.http.HttpContext.handle(HttpContext.java:1482)
> at org.mortbay.http.HttpServer.service(HttpServer.java:909)
> at org.mortbay.http.HttpConnection.service(HttpConnection.java
> :816)
> at org.mortbay.http.HttpConnection.handleNext(HttpConnection.java
> :982)
> at org.mortbay.http.HttpConnection.handle(HttpConnection.java:833)
> at org.mortbay.http.SocketListener.handleConnection(
> SocketListener.java:244)
> at org.mortbay.util.ThreadedServer.handle(ThreadedServer.java:357)
> at org.mortbay.util.ThreadPool$PoolThread.run(ThreadPool.java:534)
> Caused by: java.lang.NullPointerException
> at
> org.codehaus.plexus.redback.xwork.checks.security.GuestUserEnvironmentCheck.validate