Commit 0c36e432 authored by Spiros Koulouzis's avatar Spiros Koulouzis

check proxy permissions

parent 5fa4e769
......@@ -72,7 +72,7 @@
<h1 class="page-header">Files and Libraries</h1>
<h3 id="artifact_gwt_json_overlay">GWT JSON Overlay</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p> <p>
The <a href="http://code.google.com/webtoolkit/">Google Web Toolkit</a> JSON Overlay library provides the JSON Overlays that
can be used to access the Web service API for this application.
......@@ -97,7 +97,7 @@
</tbody>
</table>
<h3 id="artifact_java_json_client_library">Java JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to provide the set of Java objects that can be serialized
to/from JSON using <a href="http://jackson.codehaus.org/">Jackson</a>. This is useful for accessing the
......@@ -127,7 +127,7 @@
</tbody>
</table>
<h3 id="artifact_java_xml_client_library">Java XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to access the Web service API for this application using Java.
</p>
......@@ -155,7 +155,7 @@
</tbody>
</table>
<h3 id="artifact_js_client_library">JavaScript Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The JavaScript client-side library defines classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -190,7 +190,7 @@
</tbody>
</table>
<h3 id="artifact_php_json_client_library">PHP JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP JSON client-side library defines the PHP classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -213,13 +213,13 @@
<tbody data-link="row" class="rowlink">
<tr class="clickable-row" data-href="drip-api-php.zip">
<td><span class="downloadfile-name">drip-api-php.zip</span></td>
<td><span class="downloadfile-size">5.44K</span></td>
<td><span class="downloadfile-size">5.43K</span></td>
<td><span class="downloadfile-description">&nbsp;</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_php_xml_client_library">PHP XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP client-side library defines the PHP classes that can be (de)serialized to/from XML.
This is useful for accessing the resources that are published by this application, but only
......@@ -251,7 +251,7 @@
</tbody>
</table>
<h3 id="artifact_ruby_json_client_library">Ruby JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Ruby JSON client-side library defines the Ruby classes that can be (de)serialized to/from JSON.
This is useful for accessing the REST endpoints that are published by this application, but only
......
......@@ -1211,156 +1211,110 @@ module V1
module External
module Ansible
# (no documentation provided)
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :end
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# the json hash for this BenchmarkResult
# the json hash for this CloudCredentials
def to_jaxb_json_hash
_h = super
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
return _h
end
#initializes this BenchmarkResult with a json hash
#initializes this CloudCredentials with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['delta'].nil?
_oa = _o['delta']
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if(_oa.is_a? Hash)
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@delta = Array.new
@secretKey = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@delta.push Time.from_json(_item)
@secretKey.push String.from_json(_item)
else
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@delta = _oa
@secretKey = _oa
end
end
if !_o['vmType'].nil?
_oa = _o['vmType']
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if(_oa.is_a? Hash)
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmType = Array.new
@cloudProviderName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmType.push String.from_json(_item)
@cloudProviderName.push String.from_json(_item)
else
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmType = _oa
@cloudProviderName = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
@accessKeyId = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
@accessKeyId.push String.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
@accessKeyId = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if !_o['attributes'].nil?
_oa = _o['attributes']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
@attributes = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
@attributes.push Hash.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
@attributes = _oa
end
end
end
# constructs a BenchmarkResult from a (parsed) JSON hash
# constructs a CloudCredentials from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1390,8 +1344,6 @@ end
end
end
module Nl
module Uva
......@@ -1410,110 +1362,156 @@ module V1
module External
module Ansible
# (no documentation provided)
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :end
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# the json hash for this CloudCredentials
# the json hash for this BenchmarkResult
def to_jaxb_json_hash
_h = super
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
return _h
end
#initializes this CloudCredentials with a json hash
#initializes this BenchmarkResult with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@secretKey = Array.new
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@secretKey.push String.from_json(_item)
@delta.push Time.from_json(_item)
else
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@secretKey = _oa
@delta = _oa
end
end
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if !_o['vmType'].nil?
_oa = _o['vmType']
if(_oa.is_a? Hash)
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudProviderName = Array.new
@vmType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudProviderName.push String.from_json(_item)
@vmType.push String.from_json(_item)
else
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudProviderName = _oa
@vmType = _oa
end
end
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if !_o['end'].nil?
_oa = _o['end']
if(_oa.is_a? Hash)
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@accessKeyId = Array.new
@end = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@accessKeyId.push String.from_json(_item)
@end.push Time.from_json(_item)
else
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@accessKeyId = _oa
@end = _oa
end
end
if !_o['attributes'].nil?
_oa = _o['attributes']
if !_o['host'].nil?
_oa = _o['host']
if(_oa.is_a? Hash)
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@attributes = Array.new
@host = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@attributes.push Hash.from_json(_item)
@host.push String.from_json(_item)
else
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@attributes = _oa
@host = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
end
# constructs a CloudCredentials from a (parsed) JSON hash
# constructs a BenchmarkResult from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1543,6 +1541,54 @@ end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -1666,52 +1712,6 @@ module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
......
......@@ -90,7 +90,7 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">vmType</span>
<td> <span class="property-name">host</span>
</td>
<td> <span class="datatype-reference">string
</span>
......@@ -108,7 +108,7 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">delta</span>
<td> <span class="property-name">start</span>
</td>
<td> <span class="datatype-reference">number
</span>
......@@ -117,18 +117,18 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">start</span>
<td> <span class="property-name">vmType</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">host</span>
<td> <span class="property-name">delta</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
......@@ -166,11 +166,11 @@ object is saved.</span></td>
<pre class="prettyprint language-js example">{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;delta&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -69,7 +69,7 @@ class</p>
<dl class="dl-horizontal">
<dt>Subtypes</dt>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
</dl>
<table class="table datatype-properties">
......
......@@ -753,17 +753,17 @@ class]]>
<xs:complexContent>
<xs:extension base="ownedObject">
<xs:sequence>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="delta" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="host" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="vmType" type="xs:string" minOccurs="0">
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
</xs:sequence>
</xs:extension>
......
......@@ -145,11 +145,11 @@ Content-Type: application/json
<code class="prettyprint language-js">
[ {
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;delta&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......@@ -515,11 +515,11 @@ Content-Type: application/json
<code class="prettyprint language-js">
{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;delta&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -487,6 +487,10 @@ Content-Type: application/json
<td><span class="label label-success response-code">200</span></td>
<td><span class="response-condition">Successful delete</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">404</span></td>
<td><span class="response-condition">Object not found</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">401</span></td>
<td><span class="response-condition">Bad credentials</span></td>
......
......@@ -231,12 +231,12 @@ the DAO saves the object based on the principal how made the call</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-xml example">&lt;b-----&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;end&gt;...&lt;/end&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;owner&gt;user1&lt;/owner&gt;
&lt;timestamp&gt;...&lt;/timestamp&gt;
&lt;/b-----&gt;
......
......@@ -72,7 +72,7 @@
<h1 class="page-header">Files and Libraries</h1>
<h3 id="artifact_gwt_json_overlay">GWT JSON Overlay</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p> <p>
The <a href="http://code.google.com/webtoolkit/">Google Web Toolkit</a> JSON Overlay library provides the JSON Overlays that
can be used to access the Web service API for this application.
......@@ -97,7 +97,7 @@
</tbody>
</table>
<h3 id="artifact_java_json_client_library">Java JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to provide the set of Java objects that can be serialized
to/from JSON using <a href="http://jackson.codehaus.org/">Jackson</a>. This is useful for accessing the
......@@ -127,7 +127,7 @@
</tbody>
</table>
<h3 id="artifact_java_xml_client_library">Java XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to access the Web service API for this application using Java.
</p>
......@@ -155,7 +155,7 @@
</tbody>
</table>
<h3 id="artifact_js_client_library">JavaScript Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The JavaScript client-side library defines classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -190,7 +190,7 @@
</tbody>
</table>
<h3 id="artifact_php_json_client_library">PHP JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP JSON client-side library defines the PHP classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -213,13 +213,13 @@
<tbody data-link="row" class="rowlink">
<tr class="clickable-row" data-href="drip-api-php.zip">
<td><span class="downloadfile-name">drip-api-php.zip</span></td>
<td><span class="downloadfile-size">5.44K</span></td>
<td><span class="downloadfile-size">5.43K</span></td>
<td><span class="downloadfile-description">&nbsp;</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_php_xml_client_library">PHP XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP client-side library defines the PHP classes that can be (de)serialized to/from XML.
This is useful for accessing the resources that are published by this application, but only
......@@ -251,7 +251,7 @@
</tbody>
</table>
<h3 id="artifact_ruby_json_client_library">Ruby JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Ruby JSON client-side library defines the Ruby classes that can be (de)serialized to/from JSON.
This is useful for accessing the REST endpoints that are published by this application, but only
......
......@@ -1211,156 +1211,110 @@ module V1
module External
module Ansible
# (no documentation provided)
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :end
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# the json hash for this BenchmarkResult
# the json hash for this CloudCredentials
def to_jaxb_json_hash
_h = super
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
return _h
end
#initializes this BenchmarkResult with a json hash
#initializes this CloudCredentials with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['delta'].nil?
_oa = _o['delta']
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if(_oa.is_a? Hash)
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@delta = Array.new
@secretKey = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@delta.push Time.from_json(_item)
@secretKey.push String.from_json(_item)
else
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@delta = _oa
@secretKey = _oa
end
end
if !_o['vmType'].nil?
_oa = _o['vmType']
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if(_oa.is_a? Hash)
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmType = Array.new
@cloudProviderName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmType.push String.from_json(_item)
@cloudProviderName.push String.from_json(_item)
else
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmType = _oa
@cloudProviderName = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
@accessKeyId = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
@accessKeyId.push String.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
@accessKeyId = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if !_o['attributes'].nil?
_oa = _o['attributes']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
@attributes = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
@attributes.push Hash.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
@attributes = _oa
end
end
end
# constructs a BenchmarkResult from a (parsed) JSON hash
# constructs a CloudCredentials from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1390,8 +1344,6 @@ end
end
end
module Nl
module Uva
......@@ -1410,110 +1362,156 @@ module V1
module External
module Ansible
# (no documentation provided)
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :end
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# the json hash for this CloudCredentials
# the json hash for this BenchmarkResult
def to_jaxb_json_hash
_h = super
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
return _h
end
#initializes this CloudCredentials with a json hash
#initializes this BenchmarkResult with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@secretKey = Array.new
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@secretKey.push String.from_json(_item)
@delta.push Time.from_json(_item)
else
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@secretKey = _oa
@delta = _oa
end
end
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if !_o['vmType'].nil?
_oa = _o['vmType']
if(_oa.is_a? Hash)
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudProviderName = Array.new
@vmType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudProviderName.push String.from_json(_item)
@vmType.push String.from_json(_item)
else
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudProviderName = _oa
@vmType = _oa
end
end
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if !_o['end'].nil?
_oa = _o['end']
if(_oa.is_a? Hash)
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@accessKeyId = Array.new
@end = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@accessKeyId.push String.from_json(_item)
@end.push Time.from_json(_item)
else
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@accessKeyId = _oa
@end = _oa
end
end
if !_o['attributes'].nil?
_oa = _o['attributes']
if !_o['host'].nil?
_oa = _o['host']
if(_oa.is_a? Hash)
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@attributes = Array.new
@host = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@attributes.push Hash.from_json(_item)
@host.push String.from_json(_item)
else
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@attributes = _oa
@host = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
end
# constructs a CloudCredentials from a (parsed) JSON hash
# constructs a BenchmarkResult from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1543,6 +1541,54 @@ end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -1666,52 +1712,6 @@ module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
......
......@@ -81,25 +81,25 @@ class</p>
</thead>
<tbody>
<tr>
<td> <span class="property-name">cloudDeploymentDomain</span>
<td> <span class="property-name">delta</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">start</span>
<td> <span class="property-name">vmType</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">delta</span>
<td> <span class="property-name">end</span>
</td>
<td> <span class="datatype-reference">number
</span>
......@@ -108,7 +108,7 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">vmType</span>
<td> <span class="property-name">host</span>
</td>
<td> <span class="datatype-reference">string
</span>
......@@ -117,18 +117,18 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">host</span>
<td> <span class="property-name">start</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">end</span>
<td> <span class="property-name">cloudDeploymentDomain</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
......@@ -165,12 +165,12 @@ object is saved.</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-js example">{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -69,7 +69,7 @@ class</p>
<dl class="dl-horizontal">
<dt>Subtypes</dt>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
</dl>
<table class="table datatype-properties">
......
......@@ -753,13 +753,13 @@ class]]>
<xs:complexContent>
<xs:extension base="ownedObject">
<xs:sequence>
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="start" type="xs:dateTime" minOccurs="0">
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="host" type="xs:string" minOccurs="0">
</xs:element>
......
......@@ -144,12 +144,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
[ {
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......@@ -514,12 +514,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -487,6 +487,10 @@ Content-Type: application/json
<td><span class="label label-success response-code">200</span></td>
<td><span class="response-condition">Successful delete</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">404</span></td>
<td><span class="response-condition">Object not found</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">401</span></td>
<td><span class="response-condition">Bad credentials</span></td>
......
......@@ -231,10 +231,10 @@ the DAO saves the object based on the principal how made the call</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-xml example">&lt;b-----&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;end&gt;...&lt;/end&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;owner&gt;user1&lt;/owner&gt;
......
......@@ -26,8 +26,11 @@ import java.nio.channels.Channels;
import java.nio.channels.ReadableByteChannel;
import java.nio.file.Files;
import java.nio.file.Paths;
import java.nio.file.attribute.PosixFilePermission;
import java.security.cert.CertificateEncodingException;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
import static nl.uva.sne.drip.commons.utils.FileUtils.untar;
//import org.globus.common.CoGProperties;
//import org.globus.myproxy.GetParams;
......@@ -82,14 +85,21 @@ public class AAUtils {
break;
case PROXY_FILE:
secretKey += "\n";
Files.write(Paths.get("/tmp/x509up_u1000"), secretKey.getBytes());
proxy_file = new File("/tmp/x509up_u1000");
Set<PosixFilePermission> perm = new HashSet<>();
perm.add(PosixFilePermission.OWNER_WRITE);
Files.setPosixFilePermissions(proxy_file.toPath(), perm);
Files.write(proxy_file.toPath(), secretKey.getBytes());
break;
case CERTIFICATE:
break;
default:
break;
}
Set<PosixFilePermission> perm = new HashSet<>();
perm.add(PosixFilePermission.OWNER_READ);
Files.setPosixFilePermissions(proxy_file.toPath(), perm);
return proxy_file.getAbsolutePath();
}
......
DEB [20170707-18:28:52.906] thr=1 paramiko.transport: starting thread (client mode): 0xf18b3b10L
DEB [20170707-18:28:52.906] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:52.927] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:52.927] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:52.942] thr=1 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.111] thr=1 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.111] thr=1 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.114] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.115] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:28:53.182] thr=1 paramiko.transport: userauth is OK
INF [20170707-18:28:53.206] thr=1 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.216] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.274] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.274] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.296] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.316] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.317] thr=1 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.333] thr=3 paramiko.transport: starting thread (client mode): 0xf190f710L
DEB [20170707-18:28:53.333] thr=3 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:53.354] thr=3 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:53.354] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:53.369] thr=3 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.431] thr=3 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.431] thr=3 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.434] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.435] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/2.txt
DEB [20170707-18:28:53.502] thr=3 paramiko.transport: userauth is OK
INF [20170707-18:28:53.524] thr=3 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.536] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.582] thr=3 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.582] thr=3 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.616] thr=3 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.638] thr=3 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.638] thr=3 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.654] thr=4 paramiko.transport: starting thread (client mode): 0xe3f34250L
DEB [20170707-18:28:53.655] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:53.674] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:53.675] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:53.690] thr=4 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:53.690] thr=4 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.755] thr=4 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.756] thr=4 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.756] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.757] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:28:53.826] thr=4 paramiko.transport: userauth is OK
INF [20170707-18:28:53.848] thr=4 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.858] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.904] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.905] thr=4 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.938] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.968] thr=4 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.969] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:28:53.970] thr=4 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.985] thr=4 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:28:53.985] thr=4 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:28:54.055] thr=4 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:28:54.077] thr=4 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:28:54.078] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:28:54.079] thr=4 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:28:54.094] thr=4 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:28:54.094] thr=4 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:28:54.163] thr=4 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:28:54.923] thr=4 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:28:54.940] thr=4 paramiko.transport: starting thread (client mode): 0xe3f34250L
DEB [20170707-18:28:54.940] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:54.960] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:54.961] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:54.976] thr=4 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:54.976] thr=4 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:55.039] thr=4 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:55.040] thr=4 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:55.041] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:55.042] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/2.txt
DEB [20170707-18:28:55.110] thr=4 paramiko.transport: userauth is OK
INF [20170707-18:28:55.132] thr=4 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:55.143] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:55.220] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:55.220] thr=4 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:55.260] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:03.668] thr=4 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:03.669] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:03.669] thr=4 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:03.685] thr=4 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:03.685] thr=4 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:03.755] thr=4 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:03.786] thr=4 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:03.786] thr=4 paramiko.transport: EOF in transport thread
DEB [20170707-18:29:03.804] thr=5 paramiko.transport: starting thread (client mode): 0xe3f34ed0L
DEB [20170707-18:29:03.804] thr=5 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:03.824] thr=5 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:03.825] thr=5 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:03.840] thr=5 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:03.903] thr=5 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:03.903] thr=5 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:03.904] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:03.905] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:29:03.974] thr=5 paramiko.transport: userauth is OK
INF [20170707-18:29:03.997] thr=5 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:04.006] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:04.073] thr=5 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:04.073] thr=5 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:04.123] thr=5 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:29:04.140] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:29:04.140] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:29:04.157] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:29:04.175] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:29:04.192] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:29:04.193] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:29:04.225] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:29:04.242] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:04.259] thr=5 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:04.259] thr=5 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:04.291] thr=5 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:04.320] thr=5 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:29:14.347] thr=6 paramiko.transport: starting thread (client mode): 0xe3f3c590L
DEB [20170707-18:29:14.347] thr=6 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:14.374] thr=6 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:14.374] thr=6 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:14.389] thr=6 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:14.454] thr=6 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:14.454] thr=6 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:14.456] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:14.457] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:14.522] thr=6 paramiko.transport: userauth is OK
INF [20170707-18:29:14.548] thr=6 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:14.558] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:14.629] thr=6 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:14.630] thr=6 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:14.675] thr=6 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:14.706] thr=6 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:14.707] thr=6 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:14.723] thr=7 paramiko.transport: starting thread (client mode): 0xe3f34790L
DEB [20170707-18:29:14.723] thr=7 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:14.749] thr=7 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:14.749] thr=7 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:14.839] thr=7 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:14.840] thr=7 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:14.842] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:14.843] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/2.txt
DEB [20170707-18:29:14.910] thr=7 paramiko.transport: userauth is OK
INF [20170707-18:29:14.939] thr=7 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:14.944] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:15.017] thr=7 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:15.017] thr=7 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:15.062] thr=7 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:15.089] thr=7 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:15.090] thr=7 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:15.106] thr=8 paramiko.transport: starting thread (client mode): 0xe2ec6a90L
DEB [20170707-18:29:15.106] thr=8 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:15.130] thr=8 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:15.131] thr=8 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:15.147] thr=8 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:15.147] thr=8 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:15.214] thr=8 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:15.215] thr=8 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:15.216] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:15.217] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:15.282] thr=8 paramiko.transport: userauth is OK
INF [20170707-18:29:15.308] thr=8 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:15.318] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:15.386] thr=8 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:15.386] thr=8 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:15.436] thr=8 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:15.487] thr=8 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:15.488] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:15.489] thr=8 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:15.504] thr=8 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:15.504] thr=8 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:15.575] thr=8 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:15.610] thr=8 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:15.610] thr=8 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:15.610] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:29:15.678] thr=8 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:29:15.678] thr=8 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:29:15.728] thr=8 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:29:16.461] thr=8 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:29:16.462] thr=8 paramiko.transport: EOF in transport thread
DEB [20170707-18:29:16.480] thr=9 paramiko.transport: starting thread (client mode): 0xe2ec6c90L
DEB [20170707-18:29:16.480] thr=9 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:16.500] thr=9 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:16.500] thr=9 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:16.515] thr=9 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:16.582] thr=9 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:16.582] thr=9 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:16.583] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:16.584] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/2.txt
DEB [20170707-18:29:16.650] thr=9 paramiko.transport: userauth is OK
INF [20170707-18:29:16.672] thr=9 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:16.685] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:16.749] thr=9 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:16.749] thr=9 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:16.802] thr=9 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:17.326] thr=9 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:17.326] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:17.327] thr=9 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:17.342] thr=9 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:17.343] thr=9 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:17.410] thr=9 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:17.435] thr=9 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:17.452] thr=10 paramiko.transport: starting thread (client mode): 0xe3f34890L
DEB [20170707-18:29:17.453] thr=10 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:17.473] thr=10 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:17.474] thr=10 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:17.489] thr=10 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:17.489] thr=10 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:17.551] thr=10 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:17.551] thr=10 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:17.553] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:17.554] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:17.622] thr=10 paramiko.transport: userauth is OK
INF [20170707-18:29:17.648] thr=10 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:17.655] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:17.717] thr=10 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:17.718] thr=10 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:17.736] thr=10 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:29:17.753] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:29:17.753] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:29:17.770] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:29:17.786] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:29:17.803] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:29:17.803] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:29:17.835] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:29:17.852] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:17.868] thr=10 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:17.868] thr=10 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:17.901] thr=10 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:17.930] thr=10 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:17.931] thr=10 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:17.932] thr=10 paramiko.transport: EOF in transport thread
DEB [20170707-18:30:28.007] thr=11 paramiko.transport: starting thread (client mode): 0xe2ec6fd0L
DEB [20170707-18:30:28.008] thr=11 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.034] thr=11 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.034] thr=11 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.118] thr=11 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.118] thr=11 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.120] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.121] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:28.186] thr=11 paramiko.transport: userauth is OK
INF [20170707-18:30:28.212] thr=11 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.222] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.289] thr=11 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.289] thr=11 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:28.339] thr=11 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:28.371] thr=11 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:28.372] thr=11 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:28.388] thr=12 paramiko.transport: starting thread (client mode): 0xe2ed2d90L
DEB [20170707-18:30:28.388] thr=12 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.413] thr=12 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.413] thr=12 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.430] thr=12 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.494] thr=12 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.495] thr=12 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.495] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.496] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/2.txt
DEB [20170707-18:30:28.562] thr=12 paramiko.transport: userauth is OK
INF [20170707-18:30:28.586] thr=12 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.597] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.652] thr=12 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.653] thr=12 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:28.678] thr=12 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:28.702] thr=12 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:28.703] thr=12 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:28.719] thr=13 paramiko.transport: starting thread (client mode): 0xe3f39f90L
DEB [20170707-18:30:28.719] thr=13 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.740] thr=13 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.740] thr=13 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.820] thr=13 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.820] thr=13 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.821] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.822] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:28.890] thr=13 paramiko.transport: userauth is OK
INF [20170707-18:30:28.912] thr=13 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.922] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.978] thr=13 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.978] thr=13 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:29.003] thr=13 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:29.041] thr=13 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:29.042] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:29.043] thr=13 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:29.059] thr=13 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:29.059] thr=13 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:29.127] thr=13 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:29.156] thr=13 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:30:29.156] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:30:29.157] thr=13 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:30:29.173] thr=13 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:30:29.173] thr=13 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:30:29.243] thr=13 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:30:30.011] thr=13 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:30:30.029] thr=14 paramiko.transport: starting thread (client mode): 0xe2ee1f50L
DEB [20170707-18:30:30.029] thr=14 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:30.049] thr=14 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:30.049] thr=14 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:30.066] thr=14 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:30.066] thr=14 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:30.127] thr=14 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:30.127] thr=14 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:30.130] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:30.131] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/2.txt
DEB [20170707-18:30:30.198] thr=14 paramiko.transport: userauth is OK
INF [20170707-18:30:30.220] thr=14 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:30.231] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:30.329] thr=14 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:30.330] thr=14 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:30.348] thr=14 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:30.855] thr=14 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:30.855] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:30.856] thr=14 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:30.871] thr=14 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:30.872] thr=14 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:31.006] thr=14 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:30:31.059] thr=15 paramiko.transport: starting thread (client mode): 0xe3f399d0L
DEB [20170707-18:30:31.060] thr=15 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:31.086] thr=15 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:31.086] thr=15 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:31.101] thr=15 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:31.173] thr=15 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:31.173] thr=15 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:31.181] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:31.182] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:31.242] thr=15 paramiko.transport: userauth is OK
INF [20170707-18:30:31.268] thr=15 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:31.283] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:31.346] thr=15 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:31.346] thr=15 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:31.364] thr=15 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:30:31.381] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:30:31.381] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:30:31.398] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:30:31.414] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:30:31.431] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:30:31.432] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:30:31.463] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:30:31.480] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:31.497] thr=15 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:31.497] thr=15 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:31.529] thr=15 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:31.566] thr=15 paramiko.transport: [chan 1] EOF received (1)
DEB [20170711-19:15:36.966] thr=1 paramiko.transport: starting thread (client mode): 0x903a1bd0L
DEB [20170711-19:15:36.966] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170711-19:15:36.991] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170711-19:15:36.991] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170711-19:15:37.008] thr=1 paramiko.transport: Compression agreed: none
DEB [20170711-19:15:37.255] thr=1 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170711-19:15:37.256] thr=1 paramiko.transport: Switch to new keys ...
DEB [20170711-19:15:37.278] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.99: b52eedf98c6725dfd7763578dfe6a6e1
DEB [20170711-19:15:37.280] thr=2 paramiko.transport: Trying key d216e288f317417ef44abccaf2ed5213 from /home/alogo/workspace/DRIP/drip-deployer/1499793336939/1.txt
DEB [20170711-19:15:37.325] thr=1 paramiko.transport: userauth is OK
INF [20170711-19:15:37.351] thr=1 paramiko.transport: Authentication (publickey) successful!
DEB [20170711-19:15:37.380] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170711-19:15:37.432] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170711-19:15:37.432] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20170711-19:15:37.461] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170711-19:15:37.495] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20170711-19:15:37.496] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170711-19:15:37.496] thr=1 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170711-19:15:37.512] thr=1 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170711-19:15:37.512] thr=1 paramiko.transport: Secsh channel 1 opened.
DEB [20170711-19:15:37.582] thr=1 paramiko.transport: [chan 1] Sesch channel 1 request ok
INF [20170711-19:15:37.599] thr=2 paramiko.transport.sftp: [chan 1] Opened sftp connection (server version 3)
DEB [20170711-19:15:37.599] thr=2 paramiko.transport.sftp: [chan 1] stat('/tmp/')
DEB [20170711-19:15:37.615] thr=2 paramiko.transport.sftp: [chan 1] normalize('/tmp/')
DEB [20170711-19:15:37.632] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/engine_setup.sh', 'wb')
DEB [20170711-19:15:37.649] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/engine_setup.sh', 'wb') -> 00000000
DEB [20170711-19:15:37.652] thr=2 paramiko.transport.sftp: [chan 1] close(00000000)
DEB [20170711-19:15:37.684] thr=2 paramiko.transport.sftp: [chan 1] stat('/tmp/engine_setup.sh')
DEB [20170711-19:15:37.701] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170711-19:15:37.717] thr=1 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170711-19:15:37.717] thr=1 paramiko.transport: Secsh channel 2 opened.
DEB [20170711-19:15:37.749] thr=1 paramiko.transport: [chan 2] Sesch channel 2 request ok
......@@ -86,7 +86,7 @@ def handleDelivery(message):
fo = open(compose_file, "w")
fo.write(value)
fo.close()
elif name == "scale":
elif name == "scale":
name_of_deployment = param["value"]
name_of_service = param["attributes"]["service"]
number_of_containers = param["attributes"]["number"]
......
No preview for this file type
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment