Skip to content

No access attributes defined for login page URL #508

@resuscitateocean

Description

@resuscitateocean

无法启动

使用的版本:kylin-3.0.2
hbase2.0.5
hadoop3.1.3
zookeeper3.4.10

日志:
。。。
2022-05-26 12:29:16,041 INFO [Curator-LeaderSelector-0] coordinate.StreamingCoordinator:626 : Current node become the lead coordinator.
2022-05-26 12:29:16,075 INFO [Curator-LeaderSelector-0] coordinate.BuildJobSubmitter:85 : Restore job submitter
2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException
2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage()
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage()
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,525 INFO [localhost-startStop-1] common.KylinConfig:473 : Creating new manager instance of class org.apache.kylin.rest.security.KylinUserManager
2022-05-26 12:29:16,526 INFO [localhost-startStop-1] security.KylinUserManager:60 : Initializing KylinUserManager with config kylin_metadata@hbase
2022-05-26 12:29:16,526 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:122 : Reloading ManagedUser from kylin_metadata(key='/user')@kylin_metadata@hbase
2022-05-26 12:29:16,550 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:155 : Loaded 3 ManagedUser(s) out of 3 resource with 0 errors
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/
']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query//stop']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/
/stop']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query*/
']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata*/
']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api//metrics']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/
/metrics']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/
']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin*/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin*/
']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/
']
2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes
2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes
2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95]
2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95]
2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration
2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/
'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query//stop'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/
/stop'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query*/
'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata*/
'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api//metrics'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/
/metrics'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/
'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/
'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes*/'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/
'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions