Commit 0c36e432 authored by Spiros Koulouzis's avatar Spiros Koulouzis

check proxy permissions

parent 5fa4e769
......@@ -72,7 +72,7 @@
<h1 class="page-header">Files and Libraries</h1>
<h3 id="artifact_gwt_json_overlay">GWT JSON Overlay</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p> <p>
The <a href="http://code.google.com/webtoolkit/">Google Web Toolkit</a> JSON Overlay library provides the JSON Overlays that
can be used to access the Web service API for this application.
......@@ -97,7 +97,7 @@
</tbody>
</table>
<h3 id="artifact_java_json_client_library">Java JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to provide the set of Java objects that can be serialized
to/from JSON using <a href="http://jackson.codehaus.org/">Jackson</a>. This is useful for accessing the
......@@ -127,7 +127,7 @@
</tbody>
</table>
<h3 id="artifact_java_xml_client_library">Java XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to access the Web service API for this application using Java.
</p>
......@@ -155,7 +155,7 @@
</tbody>
</table>
<h3 id="artifact_js_client_library">JavaScript Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The JavaScript client-side library defines classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -190,7 +190,7 @@
</tbody>
</table>
<h3 id="artifact_php_json_client_library">PHP JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP JSON client-side library defines the PHP classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -213,13 +213,13 @@
<tbody data-link="row" class="rowlink">
<tr class="clickable-row" data-href="drip-api-php.zip">
<td><span class="downloadfile-name">drip-api-php.zip</span></td>
<td><span class="downloadfile-size">5.44K</span></td>
<td><span class="downloadfile-size">5.43K</span></td>
<td><span class="downloadfile-description">&nbsp;</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_php_xml_client_library">PHP XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP client-side library defines the PHP classes that can be (de)serialized to/from XML.
This is useful for accessing the resources that are published by this application, but only
......@@ -251,7 +251,7 @@
</tbody>
</table>
<h3 id="artifact_ruby_json_client_library">Ruby JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Ruby JSON client-side library defines the Ruby classes that can be (de)serialized to/from JSON.
This is useful for accessing the REST endpoints that are published by this application, but only
......
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
......@@ -1211,156 +1211,110 @@ module V1
module External
module Ansible
# (no documentation provided)
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :end
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# the json hash for this BenchmarkResult
# the json hash for this CloudCredentials
def to_jaxb_json_hash
_h = super
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
return _h
end
#initializes this BenchmarkResult with a json hash
#initializes this CloudCredentials with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['delta'].nil?
_oa = _o['delta']
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if(_oa.is_a? Hash)
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@delta = Array.new
@secretKey = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@delta.push Time.from_json(_item)
@secretKey.push String.from_json(_item)
else
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@delta = _oa
@secretKey = _oa
end
end
if !_o['vmType'].nil?
_oa = _o['vmType']
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if(_oa.is_a? Hash)
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmType = Array.new
@cloudProviderName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmType.push String.from_json(_item)
@cloudProviderName.push String.from_json(_item)
else
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmType = _oa
@cloudProviderName = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
@accessKeyId = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
@accessKeyId.push String.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
@accessKeyId = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if !_o['attributes'].nil?
_oa = _o['attributes']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
@attributes = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
@attributes.push Hash.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
@attributes = _oa
end
end
end
# constructs a BenchmarkResult from a (parsed) JSON hash
# constructs a CloudCredentials from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1390,8 +1344,6 @@ end
end
end
module Nl
module Uva
......@@ -1410,110 +1362,156 @@ module V1
module External
module Ansible
# (no documentation provided)
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :end
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# the json hash for this CloudCredentials
# the json hash for this BenchmarkResult
def to_jaxb_json_hash
_h = super
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
return _h
end
#initializes this CloudCredentials with a json hash
#initializes this BenchmarkResult with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@secretKey = Array.new
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@secretKey.push String.from_json(_item)
@delta.push Time.from_json(_item)
else
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@secretKey = _oa
@delta = _oa
end
end
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if !_o['vmType'].nil?
_oa = _o['vmType']
if(_oa.is_a? Hash)
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudProviderName = Array.new
@vmType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudProviderName.push String.from_json(_item)
@vmType.push String.from_json(_item)
else
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudProviderName = _oa
@vmType = _oa
end
end
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if !_o['end'].nil?
_oa = _o['end']
if(_oa.is_a? Hash)
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@accessKeyId = Array.new
@end = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@accessKeyId.push String.from_json(_item)
@end.push Time.from_json(_item)
else
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@accessKeyId = _oa
@end = _oa
end
end
if !_o['attributes'].nil?
_oa = _o['attributes']
if !_o['host'].nil?
_oa = _o['host']
if(_oa.is_a? Hash)
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@attributes = Array.new
@host = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@attributes.push Hash.from_json(_item)
@host.push String.from_json(_item)
else
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@attributes = _oa
@host = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
end
# constructs a CloudCredentials from a (parsed) JSON hash
# constructs a BenchmarkResult from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1543,6 +1541,54 @@ end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -1666,52 +1712,6 @@ module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
......
......@@ -90,7 +90,7 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">vmType</span>
<td> <span class="property-name">host</span>
</td>
<td> <span class="datatype-reference">string
</span>
......@@ -108,7 +108,7 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">delta</span>
<td> <span class="property-name">start</span>
</td>
<td> <span class="datatype-reference">number
</span>
......@@ -117,18 +117,18 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">start</span>
<td> <span class="property-name">vmType</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">host</span>
<td> <span class="property-name">delta</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
......@@ -166,11 +166,11 @@ object is saved.</span></td>
<pre class="prettyprint language-js example">{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;delta&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -69,7 +69,7 @@ class</p>
<dl class="dl-horizontal">
<dt>Subtypes</dt>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
</dl>
<table class="table datatype-properties">
......
......@@ -753,17 +753,17 @@ class]]>
<xs:complexContent>
<xs:extension base="ownedObject">
<xs:sequence>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="delta" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="host" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="vmType" type="xs:string" minOccurs="0">
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
</xs:sequence>
</xs:extension>
......
......@@ -145,11 +145,11 @@ Content-Type: application/json
<code class="prettyprint language-js">
[ {
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;delta&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......@@ -515,11 +515,11 @@ Content-Type: application/json
<code class="prettyprint language-js">
{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;delta&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -487,6 +487,10 @@ Content-Type: application/json
<td><span class="label label-success response-code">200</span></td>
<td><span class="response-condition">Successful delete</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">404</span></td>
<td><span class="response-condition">Object not found</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">401</span></td>
<td><span class="response-condition">Bad credentials</span></td>
......
......@@ -231,12 +231,12 @@ the DAO saves the object based on the principal how made the call</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-xml example">&lt;b-----&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;end&gt;...&lt;/end&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;owner&gt;user1&lt;/owner&gt;
&lt;timestamp&gt;...&lt;/timestamp&gt;
&lt;/b-----&gt;
......
......@@ -72,7 +72,7 @@
<h1 class="page-header">Files and Libraries</h1>
<h3 id="artifact_gwt_json_overlay">GWT JSON Overlay</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p> <p>
The <a href="http://code.google.com/webtoolkit/">Google Web Toolkit</a> JSON Overlay library provides the JSON Overlays that
can be used to access the Web service API for this application.
......@@ -97,7 +97,7 @@
</tbody>
</table>
<h3 id="artifact_java_json_client_library">Java JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to provide the set of Java objects that can be serialized
to/from JSON using <a href="http://jackson.codehaus.org/">Jackson</a>. This is useful for accessing the
......@@ -127,7 +127,7 @@
</tbody>
</table>
<h3 id="artifact_java_xml_client_library">Java XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Java client-side library is used to access the Web service API for this application using Java.
</p>
......@@ -155,7 +155,7 @@
</tbody>
</table>
<h3 id="artifact_js_client_library">JavaScript Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The JavaScript client-side library defines classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -190,7 +190,7 @@
</tbody>
</table>
<h3 id="artifact_php_json_client_library">PHP JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP JSON client-side library defines the PHP classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -213,13 +213,13 @@
<tbody data-link="row" class="rowlink">
<tr class="clickable-row" data-href="drip-api-php.zip">
<td><span class="downloadfile-name">drip-api-php.zip</span></td>
<td><span class="downloadfile-size">5.44K</span></td>
<td><span class="downloadfile-size">5.43K</span></td>
<td><span class="downloadfile-description">&nbsp;</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_php_xml_client_library">PHP XML Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The PHP client-side library defines the PHP classes that can be (de)serialized to/from XML.
This is useful for accessing the resources that are published by this application, but only
......@@ -251,7 +251,7 @@
</tbody>
</table>
<h3 id="artifact_ruby_json_client_library">Ruby JSON Client Library</h3>
<p class="lead">Created July 7, 2017</p>
<p class="lead">Created July 11, 2017</p>
<p><p>
The Ruby JSON client-side library defines the Ruby classes that can be (de)serialized to/from JSON.
This is useful for accessing the REST endpoints that are published by this application, but only
......
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
No preview for this file type
......@@ -1211,156 +1211,110 @@ module V1
module External
module Ansible
# (no documentation provided)
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :end
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# the json hash for this BenchmarkResult
# the json hash for this CloudCredentials
def to_jaxb_json_hash
_h = super
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
return _h
end
#initializes this BenchmarkResult with a json hash
#initializes this CloudCredentials with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['delta'].nil?
_oa = _o['delta']
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if(_oa.is_a? Hash)
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@delta = Array.new
@secretKey = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@delta.push Time.from_json(_item)
@secretKey.push String.from_json(_item)
else
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@delta = _oa
@secretKey = _oa
end
end
if !_o['vmType'].nil?
_oa = _o['vmType']
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if(_oa.is_a? Hash)
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmType = Array.new
@cloudProviderName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmType.push String.from_json(_item)
@cloudProviderName.push String.from_json(_item)
else
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmType = _oa
@cloudProviderName = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
@accessKeyId = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
@accessKeyId.push String.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
@accessKeyId = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if !_o['attributes'].nil?
_oa = _o['attributes']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
@attributes = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
@attributes.push Hash.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
@attributes = _oa
end
end
end
# constructs a BenchmarkResult from a (parsed) JSON hash
# constructs a CloudCredentials from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1390,8 +1344,6 @@ end
end
end
module Nl
module Uva
......@@ -1410,110 +1362,156 @@ module V1
module External
module Ansible
# (no documentation provided)
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :end
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# the json hash for this CloudCredentials
# the json hash for this BenchmarkResult
def to_jaxb_json_hash
_h = super
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
return _h
end
#initializes this CloudCredentials with a json hash
#initializes this BenchmarkResult with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@secretKey = Array.new
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@secretKey.push String.from_json(_item)
@delta.push Time.from_json(_item)
else
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@secretKey = _oa
@delta = _oa
end
end
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if !_o['vmType'].nil?
_oa = _o['vmType']
if(_oa.is_a? Hash)
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudProviderName = Array.new
@vmType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudProviderName.push String.from_json(_item)
@vmType.push String.from_json(_item)
else
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudProviderName = _oa
@vmType = _oa
end
end
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if !_o['end'].nil?
_oa = _o['end']
if(_oa.is_a? Hash)
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@accessKeyId = Array.new
@end = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@accessKeyId.push String.from_json(_item)
@end.push Time.from_json(_item)
else
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@accessKeyId = _oa
@end = _oa
end
end
if !_o['attributes'].nil?
_oa = _o['attributes']
if !_o['host'].nil?
_oa = _o['host']
if(_oa.is_a? Hash)
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@attributes = Array.new
@host = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@attributes.push Hash.from_json(_item)
@host.push String.from_json(_item)
else
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@attributes = _oa
@host = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
end
end
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
end
# constructs a CloudCredentials from a (parsed) JSON hash
# constructs a BenchmarkResult from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1543,6 +1541,54 @@ end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -1666,52 +1712,6 @@ module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
......
......@@ -81,25 +81,25 @@ class</p>
</thead>
<tbody>
<tr>
<td> <span class="property-name">cloudDeploymentDomain</span>
<td> <span class="property-name">delta</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">start</span>
<td> <span class="property-name">vmType</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">delta</span>
<td> <span class="property-name">end</span>
</td>
<td> <span class="datatype-reference">number
</span>
......@@ -108,7 +108,7 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">vmType</span>
<td> <span class="property-name">host</span>
</td>
<td> <span class="datatype-reference">string
</span>
......@@ -117,18 +117,18 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">host</span>
<td> <span class="property-name">start</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">end</span>
<td> <span class="property-name">cloudDeploymentDomain</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
......@@ -165,12 +165,12 @@ object is saved.</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-js example">{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -69,7 +69,7 @@ class</p>
<dl class="dl-horizontal">
<dt>Subtypes</dt>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
</dl>
<table class="table datatype-properties">
......
......@@ -753,13 +753,13 @@ class]]>
<xs:complexContent>
<xs:extension base="ownedObject">
<xs:sequence>
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="start" type="xs:dateTime" minOccurs="0">
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="host" type="xs:string" minOccurs="0">
</xs:element>
......
......@@ -144,12 +144,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
[ {
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......@@ -514,12 +514,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
{
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -487,6 +487,10 @@ Content-Type: application/json
<td><span class="label label-success response-code">200</span></td>
<td><span class="response-condition">Successful delete</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">404</span></td>
<td><span class="response-condition">Object not found</span></td>
</tr>
<tr>
<td><span class="label label-warning response-code">401</span></td>
<td><span class="response-condition">Bad credentials</span></td>
......
......@@ -231,10 +231,10 @@ the DAO saves the object based on the principal how made the call</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-xml example">&lt;b-----&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;end&gt;...&lt;/end&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;owner&gt;user1&lt;/owner&gt;
......
......@@ -26,8 +26,11 @@ import java.nio.channels.Channels;
import java.nio.channels.ReadableByteChannel;
import java.nio.file.Files;
import java.nio.file.Paths;
import java.nio.file.attribute.PosixFilePermission;
import java.security.cert.CertificateEncodingException;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
import static nl.uva.sne.drip.commons.utils.FileUtils.untar;
//import org.globus.common.CoGProperties;
//import org.globus.myproxy.GetParams;
......@@ -82,14 +85,21 @@ public class AAUtils {
break;
case PROXY_FILE:
secretKey += "\n";
Files.write(Paths.get("/tmp/x509up_u1000"), secretKey.getBytes());
proxy_file = new File("/tmp/x509up_u1000");
Set<PosixFilePermission> perm = new HashSet<>();
perm.add(PosixFilePermission.OWNER_WRITE);
Files.setPosixFilePermissions(proxy_file.toPath(), perm);
Files.write(proxy_file.toPath(), secretKey.getBytes());
break;
case CERTIFICATE:
break;
default:
break;
}
Set<PosixFilePermission> perm = new HashSet<>();
perm.add(PosixFilePermission.OWNER_READ);
Files.setPosixFilePermissions(proxy_file.toPath(), perm);
return proxy_file.getAbsolutePath();
}
......
DEB [20170707-18:28:52.906] thr=1 paramiko.transport: starting thread (client mode): 0xf18b3b10L
DEB [20170707-18:28:52.906] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:52.927] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:52.927] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:52.942] thr=1 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.111] thr=1 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.111] thr=1 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.114] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.115] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:28:53.182] thr=1 paramiko.transport: userauth is OK
INF [20170707-18:28:53.206] thr=1 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.216] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.274] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.274] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.296] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.316] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.317] thr=1 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.333] thr=3 paramiko.transport: starting thread (client mode): 0xf190f710L
DEB [20170707-18:28:53.333] thr=3 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:53.354] thr=3 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:53.354] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:53.369] thr=3 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.431] thr=3 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.431] thr=3 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.434] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.435] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/2.txt
DEB [20170707-18:28:53.502] thr=3 paramiko.transport: userauth is OK
INF [20170707-18:28:53.524] thr=3 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.536] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.582] thr=3 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.582] thr=3 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.616] thr=3 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.638] thr=3 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.638] thr=3 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.654] thr=4 paramiko.transport: starting thread (client mode): 0xe3f34250L
DEB [20170707-18:28:53.655] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:53.674] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:53.675] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:53.690] thr=4 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:53.690] thr=4 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.755] thr=4 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.756] thr=4 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.756] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.757] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:28:53.826] thr=4 paramiko.transport: userauth is OK
INF [20170707-18:28:53.848] thr=4 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.858] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.904] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.905] thr=4 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.938] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.968] thr=4 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.969] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:28:53.970] thr=4 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.985] thr=4 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:28:53.985] thr=4 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:28:54.055] thr=4 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:28:54.077] thr=4 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:28:54.078] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:28:54.079] thr=4 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:28:54.094] thr=4 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:28:54.094] thr=4 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:28:54.163] thr=4 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:28:54.923] thr=4 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:28:54.940] thr=4 paramiko.transport: starting thread (client mode): 0xe3f34250L
DEB [20170707-18:28:54.940] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:54.960] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:54.961] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:54.976] thr=4 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:54.976] thr=4 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:55.039] thr=4 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:55.040] thr=4 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:55.041] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:55.042] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/2.txt
DEB [20170707-18:28:55.110] thr=4 paramiko.transport: userauth is OK
INF [20170707-18:28:55.132] thr=4 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:55.143] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:55.220] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:55.220] thr=4 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:55.260] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:03.668] thr=4 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:03.669] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:03.669] thr=4 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:03.685] thr=4 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:03.685] thr=4 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:03.755] thr=4 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:03.786] thr=4 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:03.786] thr=4 paramiko.transport: EOF in transport thread
DEB [20170707-18:29:03.804] thr=5 paramiko.transport: starting thread (client mode): 0xe3f34ed0L
DEB [20170707-18:29:03.804] thr=5 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:03.824] thr=5 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:03.825] thr=5 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:03.840] thr=5 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:03.903] thr=5 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:03.903] thr=5 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:03.904] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:03.905] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:29:03.974] thr=5 paramiko.transport: userauth is OK
INF [20170707-18:29:03.997] thr=5 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:04.006] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:04.073] thr=5 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:04.073] thr=5 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:04.123] thr=5 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:29:04.140] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:29:04.140] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:29:04.157] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:29:04.175] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:29:04.192] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:29:04.193] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:29:04.225] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:29:04.242] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:04.259] thr=5 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:04.259] thr=5 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:04.291] thr=5 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:04.320] thr=5 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:29:14.347] thr=6 paramiko.transport: starting thread (client mode): 0xe3f3c590L
DEB [20170707-18:29:14.347] thr=6 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:14.374] thr=6 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:14.374] thr=6 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:14.389] thr=6 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:14.454] thr=6 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:14.454] thr=6 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:14.456] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:14.457] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:14.522] thr=6 paramiko.transport: userauth is OK
INF [20170707-18:29:14.548] thr=6 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:14.558] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:14.629] thr=6 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:14.630] thr=6 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:14.675] thr=6 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:14.706] thr=6 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:14.707] thr=6 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:14.723] thr=7 paramiko.transport: starting thread (client mode): 0xe3f34790L
DEB [20170707-18:29:14.723] thr=7 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:14.749] thr=7 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:14.749] thr=7 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:14.839] thr=7 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:14.840] thr=7 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:14.842] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:14.843] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/2.txt
DEB [20170707-18:29:14.910] thr=7 paramiko.transport: userauth is OK
INF [20170707-18:29:14.939] thr=7 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:14.944] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:15.017] thr=7 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:15.017] thr=7 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:15.062] thr=7 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:15.089] thr=7 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:15.090] thr=7 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:15.106] thr=8 paramiko.transport: starting thread (client mode): 0xe2ec6a90L
DEB [20170707-18:29:15.106] thr=8 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:15.130] thr=8 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:15.131] thr=8 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:15.147] thr=8 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:15.147] thr=8 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:15.214] thr=8 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:15.215] thr=8 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:15.216] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:15.217] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:15.282] thr=8 paramiko.transport: userauth is OK
INF [20170707-18:29:15.308] thr=8 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:15.318] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:15.386] thr=8 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:15.386] thr=8 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:15.436] thr=8 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:15.487] thr=8 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:15.488] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:15.489] thr=8 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:15.504] thr=8 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:15.504] thr=8 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:15.575] thr=8 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:15.610] thr=8 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:15.610] thr=8 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:15.610] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:29:15.678] thr=8 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:29:15.678] thr=8 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:29:15.728] thr=8 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:29:16.461] thr=8 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:29:16.462] thr=8 paramiko.transport: EOF in transport thread
DEB [20170707-18:29:16.480] thr=9 paramiko.transport: starting thread (client mode): 0xe2ec6c90L
DEB [20170707-18:29:16.480] thr=9 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:16.500] thr=9 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:16.500] thr=9 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:16.515] thr=9 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:16.582] thr=9 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:16.582] thr=9 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:16.583] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:16.584] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/2.txt
DEB [20170707-18:29:16.650] thr=9 paramiko.transport: userauth is OK
INF [20170707-18:29:16.672] thr=9 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:16.685] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:16.749] thr=9 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:16.749] thr=9 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:16.802] thr=9 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:17.326] thr=9 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:17.326] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:17.327] thr=9 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:17.342] thr=9 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:17.343] thr=9 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:17.410] thr=9 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:17.435] thr=9 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:17.452] thr=10 paramiko.transport: starting thread (client mode): 0xe3f34890L
DEB [20170707-18:29:17.453] thr=10 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:17.473] thr=10 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:17.474] thr=10 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:17.489] thr=10 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:17.489] thr=10 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:17.551] thr=10 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:17.551] thr=10 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:17.553] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:17.554] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:17.622] thr=10 paramiko.transport: userauth is OK
INF [20170707-18:29:17.648] thr=10 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:17.655] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:17.717] thr=10 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:17.718] thr=10 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:17.736] thr=10 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:29:17.753] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:29:17.753] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:29:17.770] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:29:17.786] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:29:17.803] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:29:17.803] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:29:17.835] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:29:17.852] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:17.868] thr=10 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:17.868] thr=10 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:17.901] thr=10 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:17.930] thr=10 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:17.931] thr=10 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:17.932] thr=10 paramiko.transport: EOF in transport thread
DEB [20170707-18:30:28.007] thr=11 paramiko.transport: starting thread (client mode): 0xe2ec6fd0L
DEB [20170707-18:30:28.008] thr=11 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.034] thr=11 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.034] thr=11 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.118] thr=11 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.118] thr=11 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.120] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.121] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:28.186] thr=11 paramiko.transport: userauth is OK
INF [20170707-18:30:28.212] thr=11 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.222] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.289] thr=11 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.289] thr=11 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:28.339] thr=11 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:28.371] thr=11 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:28.372] thr=11 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:28.388] thr=12 paramiko.transport: starting thread (client mode): 0xe2ed2d90L
DEB [20170707-18:30:28.388] thr=12 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.413] thr=12 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.413] thr=12 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.430] thr=12 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.494] thr=12 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.495] thr=12 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.495] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.496] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/2.txt
DEB [20170707-18:30:28.562] thr=12 paramiko.transport: userauth is OK
INF [20170707-18:30:28.586] thr=12 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.597] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.652] thr=12 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.653] thr=12 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:28.678] thr=12 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:28.702] thr=12 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:28.703] thr=12 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:28.719] thr=13 paramiko.transport: starting thread (client mode): 0xe3f39f90L
DEB [20170707-18:30:28.719] thr=13 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.740] thr=13 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.740] thr=13 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.820] thr=13 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.820] thr=13 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.821] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.822] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:28.890] thr=13 paramiko.transport: userauth is OK
INF [20170707-18:30:28.912] thr=13 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.922] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.978] thr=13 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.978] thr=13 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:29.003] thr=13 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:29.041] thr=13 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:29.042] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:29.043] thr=13 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:29.059] thr=13 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:29.059] thr=13 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:29.127] thr=13 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:29.156] thr=13 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:30:29.156] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:30:29.157] thr=13 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:30:29.173] thr=13 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:30:29.173] thr=13 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:30:29.243] thr=13 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:30:30.011] thr=13 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:30:30.029] thr=14 paramiko.transport: starting thread (client mode): 0xe2ee1f50L
DEB [20170707-18:30:30.029] thr=14 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:30.049] thr=14 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:30.049] thr=14 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:30.066] thr=14 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:30.066] thr=14 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:30.127] thr=14 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:30.127] thr=14 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:30.130] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:30.131] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/2.txt
DEB [20170707-18:30:30.198] thr=14 paramiko.transport: userauth is OK
INF [20170707-18:30:30.220] thr=14 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:30.231] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:30.329] thr=14 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:30.330] thr=14 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:30.348] thr=14 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:30.855] thr=14 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:30.855] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:30.856] thr=14 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:30.871] thr=14 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:30.872] thr=14 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:31.006] thr=14 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:30:31.059] thr=15 paramiko.transport: starting thread (client mode): 0xe3f399d0L
DEB [20170707-18:30:31.060] thr=15 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:31.086] thr=15 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:31.086] thr=15 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:31.101] thr=15 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:31.173] thr=15 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:31.173] thr=15 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:31.181] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:31.182] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:31.242] thr=15 paramiko.transport: userauth is OK
INF [20170707-18:30:31.268] thr=15 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:31.283] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:31.346] thr=15 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:31.346] thr=15 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:31.364] thr=15 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:30:31.381] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:30:31.381] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:30:31.398] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:30:31.414] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:30:31.431] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:30:31.432] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:30:31.463] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:30:31.480] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:31.497] thr=15 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:31.497] thr=15 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:31.529] thr=15 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:31.566] thr=15 paramiko.transport: [chan 1] EOF received (1)
DEB [20170711-19:15:36.966] thr=1 paramiko.transport: starting thread (client mode): 0x903a1bd0L
DEB [20170711-19:15:36.966] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170711-19:15:36.991] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170711-19:15:36.991] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170711-19:15:37.007] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170711-19:15:37.008] thr=1 paramiko.transport: Compression agreed: none
DEB [20170711-19:15:37.255] thr=1 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170711-19:15:37.256] thr=1 paramiko.transport: Switch to new keys ...
DEB [20170711-19:15:37.278] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.99: b52eedf98c6725dfd7763578dfe6a6e1
DEB [20170711-19:15:37.280] thr=2 paramiko.transport: Trying key d216e288f317417ef44abccaf2ed5213 from /home/alogo/workspace/DRIP/drip-deployer/1499793336939/1.txt
DEB [20170711-19:15:37.325] thr=1 paramiko.transport: userauth is OK
INF [20170711-19:15:37.351] thr=1 paramiko.transport: Authentication (publickey) successful!
DEB [20170711-19:15:37.380] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170711-19:15:37.432] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170711-19:15:37.432] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20170711-19:15:37.461] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170711-19:15:37.495] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20170711-19:15:37.496] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170711-19:15:37.496] thr=1 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170711-19:15:37.512] thr=1 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170711-19:15:37.512] thr=1 paramiko.transport: Secsh channel 1 opened.
DEB [20170711-19:15:37.582] thr=1 paramiko.transport: [chan 1] Sesch channel 1 request ok
INF [20170711-19:15:37.599] thr=2 paramiko.transport.sftp: [chan 1] Opened sftp connection (server version 3)
DEB [20170711-19:15:37.599] thr=2 paramiko.transport.sftp: [chan 1] stat('/tmp/')
DEB [20170711-19:15:37.615] thr=2 paramiko.transport.sftp: [chan 1] normalize('/tmp/')
DEB [20170711-19:15:37.632] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/engine_setup.sh', 'wb')
DEB [20170711-19:15:37.649] thr=2 paramiko.transport.sftp: [chan 1] open('/tmp/engine_setup.sh', 'wb') -> 00000000
DEB [20170711-19:15:37.652] thr=2 paramiko.transport.sftp: [chan 1] close(00000000)
DEB [20170711-19:15:37.684] thr=2 paramiko.transport.sftp: [chan 1] stat('/tmp/engine_setup.sh')
DEB [20170711-19:15:37.701] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170711-19:15:37.717] thr=1 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170711-19:15:37.717] thr=1 paramiko.transport: Secsh channel 2 opened.
DEB [20170711-19:15:37.749] thr=1 paramiko.transport: [chan 2] Sesch channel 2 request ok
File added
No preview for this file type
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment