Created
August 27, 2018 12:20
-
-
Save MasinAD/dbc90d0ccea1e1bab686e1bb0810c25a to your computer and use it in GitHub Desktop.
opsiconfd-Log bei Login als root
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[7] [Aug 27 14:16:27] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f2520036b90 (Logger.py|489) | |
[6] [Aug 27 14:16:27] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:27] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f2520036b90> started processing (Worker.py|250) | |
[5] [Aug 27 14:16:27] Application 'opsi config editor 4.0.7.6.34' on client '172.16.66.209' did not send cookie (workers.py|185) | |
[7] [Aug 27 14:16:27] Trying to get username and password from Authorization header (workers.py|105) | |
[7] [Aug 27 14:16:27] Authorization header found (type: basic) (workers.py|109) | |
[5] [Aug 27 14:16:27] New session created (session.py|77) | |
[7] [Aug 27 14:16:27] Trying to get username and password from Authorization header (workers.py|105) | |
[7] [Aug 27 14:16:27] Authorization header found (type: basic) (workers.py|109) | |
[5] [Aug 27 14:16:27] Authorization request from root@172.16.66.209 (application: opsi config editor 4.0.7.6.34) (workers.py|217) | |
[6] [Aug 27 14:16:27] Connection from admin network (workers.py|259) | |
[7] [Aug 27 14:16:27] Trying to authenticate by operating system... (BackendManager.py|595) | |
[7] [Aug 27 14:16:27] PAM conversation: query 'login:', type 2 (BackendManager.py|727) | |
[7] [Aug 27 14:16:27] PAM conversation: query 'Password: ', type 1 (BackendManager.py|727) | |
[7] [Aug 27 14:16:27] Reading groups of user... (BackendManager.py|763) | |
[7] [Aug 27 14:16:27] Primary group of user u'root' is u'root' (BackendManager.py|765) | |
[7] [Aug 27 14:16:27] User u'root' is member of groups: set([u'root']) (BackendManager.py|769) | |
[6] [Aug 27 14:16:27] Operating system authentication successful for user 'root', groups 'root' (BackendManager.py|598) | |
[7] [Aug 27 14:16:27] Trying to lock file '/etc/opsi/opsi.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:27] File '/etc/opsi/opsi.conf' locked after 0 millis (__init__.py|234) | |
[6] [Aug 27 14:16:27] * BackendManager is creating BackendDispatcher (BackendManager.py|204) | |
[6] [Aug 27 14:16:27] Backend context was set to <BackendManager()> (Backend.py|215) | |
[6] [Aug 27 14:16:27] Loading dispatch config file '/etc/opsi/backendManager/dispatch.conf' (BackendManager.py|300) | |
[7] [Aug 27 14:16:27] Trying to lock file '/etc/opsi/backendManager/dispatch.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:27] File '/etc/opsi/backendManager/dispatch.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:27] Trying to lock file '/etc/opsi/backendManager/dispatch.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:27] File '/etc/opsi/backendManager/dispatch.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:27] Read dispatch config from file u'/etc/opsi/backendManager/dispatch.conf': [(u'backend_.*', (u'file', u'mysql', u'opsipxeconfd')), (u'host_.*', (u'file', u'opsipxeconfd')), (u'productOnClient_.*', (u'file', u'opsipxeconfd')), (u'configState_.*', (u'file', u'opsipxeconfd')), (u'license.*', (u'mysql',)), (u'softwareLicense.*', (u'mysql',)), (u'audit.*', (u'mysql',)), (u'.*', (u'file',))] (BackendManager.py|337) | |
[6] [Aug 27 14:16:27] Loading backend config '/etc/opsi/backends/opsipxeconfd.conf' (BackendManager.py|362) | |
[6] [Aug 27 14:16:27] Backend context was set to <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|215) | |
[6] [Aug 27 14:16:27] Loading backend config '/etc/opsi/backends/file.conf' (BackendManager.py|362) | |
[6] [Aug 27 14:16:27] Backend context was set to <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|215) | |
[6] [Aug 27 14:16:27] Loading backend config '/etc/opsi/backends/mysql.conf' (BackendManager.py|362) | |
[6] [Aug 27 14:16:27] Backend context was set to <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|215) | |
[7] [Aug 27 14:16:27] Trying to lock file '/etc/opsi/hwaudit/locales/en_US' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:27] File '/etc/opsi/hwaudit/locales/en_US' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'COMPUTER_SYSTEM' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'CHASSIS' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'BASE_BOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'BIOS' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'SYSTEM_SLOT' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PORT_CONNECTOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PROCESSOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'MEMORY_BANK' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'MEMORY_MODULE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'CACHE_MEMORY' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PCI_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'NETWORK_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'AUDIO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'HDAUDIO_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'IDE_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'SCSI_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'FLOPPY_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'USB_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class '1394_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PCMCIA_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'VIDEO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'FLOPPY_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'TAPE_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'HARDDISK_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'DISK_PARTITION' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'OPTICAL_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'USB_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'MONITOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'KEYBOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'POINTING_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PRINTER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] MySQL created: <MySQL(address=u'localhost')> (MySQL.py|149) | |
[6] [Aug 27 14:16:28] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:28] Missing important information about modules. Probably no modules file installed. (MySQL.py|530) | |
[7] [Aug 27 14:16:28] MySQLBackend created: <MySQLBackend()> (MySQL.py|573) | |
[7] [Aug 27 14:16:28] BackendDispatcher is creating instance methods (BackendManager.py|378) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardwareOnHost_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardwareOnHost_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardwareOnHost_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardwareOnHost_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardwareOnHost_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardware_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardware_getConfig', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardware_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardware_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardware_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditHardware_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareOnClient_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareOnClient_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareOnClient_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareOnClient_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareOnClient_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareToLicensePool_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareToLicensePool_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareToLicensePool_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareToLicensePool_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftwareToLicensePool_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftware_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftware_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftware_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftware_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'audit.*' matches method 'auditSoftware_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'backend_.*' matches method 'backend_createBase', dispatching to backends: file, mysql, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'backend_.*' matches method 'backend_deleteBase', dispatching to backends: file, mysql, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] BackendDispatcher: skipping already present method backend_exit (BackendManager.py|387) | |
[7] [Aug 27 14:16:28] BackendDispatcher: skipping already present method backend_getInterface (BackendManager.py|387) | |
[7] [Aug 27 14:16:28] BackendDispatcher: skipping already present method backend_getOptions (BackendManager.py|387) | |
[7] [Aug 27 14:16:28] u'backend_.*' matches method 'backend_getSystemConfiguration', dispatching to backends: file, mysql, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] BackendDispatcher: skipping already present method backend_info (BackendManager.py|387) | |
[7] [Aug 27 14:16:28] BackendDispatcher: skipping already present method backend_setOptions (BackendManager.py|387) | |
[7] [Aug 27 14:16:28] u'configState_.*' matches method 'configState_deleteObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'configState_.*' matches method 'configState_getHashes', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'configState_.*' matches method 'configState_getObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'configState_.*' matches method 'configState_insertObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'configState_.*' matches method 'configState_updateObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'config_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'config_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'config_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'config_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'config_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'getData', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'getRawData', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'group_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'group_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'group_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'group_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'group_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'host_.*' matches method 'host_deleteObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'host_.*' matches method 'host_getHashes', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'host_.*' matches method 'host_getObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'host_.*' matches method 'host_insertObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'host_.*' matches method 'host_updateObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseContract_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseContract_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseContract_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseContract_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseContract_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseOnClient_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseOnClient_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseOnClient_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseOnClient_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licenseOnClient_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licensePool_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licensePool_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licensePool_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licensePool_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'license.*' matches method 'licensePool_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'log_read', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'log_write', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'objectToGroup_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'objectToGroup_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'objectToGroup_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'objectToGroup_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'objectToGroup_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productDependency_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productDependency_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productDependency_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productDependency_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productDependency_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'productOnClient_.*' matches method 'productOnClient_deleteObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'productOnClient_.*' matches method 'productOnClient_getHashes', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'productOnClient_.*' matches method 'productOnClient_getObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'productOnClient_.*' matches method 'productOnClient_insertObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'productOnClient_.*' matches method 'productOnClient_updateObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productOnDepot_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productOnDepot_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productOnDepot_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productOnDepot_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productOnDepot_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productPropertyState_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productPropertyState_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productPropertyState_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productPropertyState_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productPropertyState_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productProperty_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productProperty_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productProperty_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productProperty_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'productProperty_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'product_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'product_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'product_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'product_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'product_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicense_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicense_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicense_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicense_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'softwareLicense.*' matches method 'softwareLicense_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'user_getCredentials', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:28] u'.*' matches method 'user_setCredentials', dispatching to backends: file (BackendManager.py|400) | |
[6] [Aug 27 14:16:28] * BackendManager is creating ExtendedConfigDataBackend (BackendManager.py|209) | |
[6] [Aug 27 14:16:28] Setting context to backend <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|482) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method auditHardwareOnHost_updateObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method backend_exit of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method backend_getInterface of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method backend_getOptions of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method backend_info of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method backend_setOptions of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method configState_getObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method configState_insertObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method configState_updateObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method productOnClient_getObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method productOnClient_insertObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method productOnClient_updateObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method productOnDepot_deleteObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method productOnDepot_insertObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedConfigDataBackend: overwriting method productPropertyState_getObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] Dispatching method 'auditHardware_getConfig' to backends: [u'mysql'] (BackendManager.py|412) | |
[7] [Aug 27 14:16:28] Trying to lock file '/etc/opsi/hwaudit/locales/en_US' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:28] File '/etc/opsi/hwaudit/locales/en_US' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'COMPUTER_SYSTEM' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'CHASSIS' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'BASE_BOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'BIOS' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'SYSTEM_SLOT' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PORT_CONNECTOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PROCESSOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'MEMORY_BANK' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'MEMORY_MODULE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'CACHE_MEMORY' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PCI_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'NETWORK_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'AUDIO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'HDAUDIO_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'IDE_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'SCSI_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'FLOPPY_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'USB_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class '1394_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PCMCIA_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'VIDEO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'FLOPPY_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'TAPE_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'HARDDISK_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'DISK_PARTITION' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'OPTICAL_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'USB_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'MONITOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'KEYBOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'POINTING_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:28] Found STRUCTURAL hardware class 'PRINTER' (Backend.py|1600) | |
[6] [Aug 27 14:16:28] * BackendManager is creating DepotserverBackend (BackendManager.py|215) | |
[6] [Aug 27 14:16:28] Setting context to backend <DepotserverBackend()> (Backend.py|482) | |
[7] [Aug 27 14:16:28] DepotserverBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:28] DepotserverBackend: overwriting method backend_exit of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] DepotserverBackend: overwriting method backend_getInterface of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] DepotserverBackend: overwriting method backend_getOptions of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] DepotserverBackend: overwriting method backend_info of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] DepotserverBackend: overwriting method backend_setOptions of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedBackend <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)>: executing 'host_getObjects' on backend <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|508) | |
[7] [Aug 27 14:16:28] Dispatching method 'host_getObjects' to backends: [u'file', u'opsipxeconfd'] (BackendManager.py|412) | |
[7] [Aug 27 14:16:28] Getting hosts ... (File.py|1252) | |
[7] [Aug 27 14:16:28] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:28] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:28] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:28] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:28] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:28] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:28] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:28] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:28] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:28] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:28] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:28] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[6] [Aug 27 14:16:28] * BackendManager is creating HostControlBackend (BackendManager.py|219) | |
[6] [Aug 27 14:16:28] Setting context to backend <HostControlBackend()> (Backend.py|482) | |
[7] [Aug 27 14:16:28] HostControlBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:28] HostControlBackend: overwriting method backend_exit of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlBackend: overwriting method backend_getInterface of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlBackend: overwriting method backend_getOptions of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlBackend: overwriting method backend_info of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlBackend: overwriting method backend_setOptions of backend instance <DepotserverBackend()> (Backend.py|497) | |
[6] [Aug 27 14:16:28] * BackendManager is creating HostControlBackend (BackendManager.py|228) | |
[6] [Aug 27 14:16:28] Setting context to backend <HostControlSafeBackend()> (Backend.py|482) | |
[7] [Aug 27 14:16:28] HostControlSafeBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:28] HostControlSafeBackend: overwriting method backend_exit of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlSafeBackend: overwriting method backend_getInterface of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlSafeBackend: overwriting method backend_getOptions of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlSafeBackend: overwriting method backend_info of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:28] HostControlSafeBackend: overwriting method backend_setOptions of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[6] [Aug 27 14:16:28] * BackendManager is creating BackendAccessControl (BackendManager.py|237) | |
[7] [Aug 27 14:16:28] Trying to authenticate by operating system... (BackendManager.py|595) | |
[7] [Aug 27 14:16:28] PAM conversation: query 'login:', type 2 (BackendManager.py|727) | |
[7] [Aug 27 14:16:28] PAM conversation: query 'Password: ', type 1 (BackendManager.py|727) | |
[7] [Aug 27 14:16:28] Reading groups of user... (BackendManager.py|763) | |
[7] [Aug 27 14:16:28] Primary group of user u'root' is u'root' (BackendManager.py|765) | |
[7] [Aug 27 14:16:28] User u'root' is member of groups: set([u'root']) (BackendManager.py|769) | |
[6] [Aug 27 14:16:28] Operating system authentication successful for user 'root', groups 'root' (BackendManager.py|598) | |
[7] [Aug 27 14:16:28] Trying to lock file '/etc/opsi/backendManager/acl.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:28] File '/etc/opsi/backendManager/acl.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:28] Trying to lock file '/etc/opsi/backendManager/acl.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:28] File '/etc/opsi/backendManager/acl.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:28] Read acl from file u'/etc/opsi/backendManager/acl.conf': [[u'backend_deleteBase', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}]], [u'backend_.*', [{'denyAttributes': [], 'type': u'all', 'ids': [], 'allowAttributes': []}]], [u'hostControl.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'host_get.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [u'opsiHostKey', u'description', u'lastSeen', u'notes', u'hardwareAddress', u'inventoryNumber'], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'auditSoftware_delete.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'auditSoftware_.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'auditHardware_delete.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'auditHardware_.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'user_setCredentials', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'user_getCredentials', [{'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'.*_get.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'get(Raw){0,1}Data', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}]]] (BackendManager.py|633) | |
[6] [Aug 27 14:16:28] * BackendManager is creating BackendExtender (BackendManager.py|241) | |
[6] [Aug 27 14:16:28] Setting context to backend <BackendExtender()> (Backend.py|482) | |
[7] [Aug 27 14:16:28] BackendExtender is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:28] BackendExtender: overwriting method backend_exit of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendExtender: overwriting method backend_getInterface of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendExtender: overwriting method backend_getOptions of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendExtender: overwriting method backend_info of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendExtender: overwriting method backend_setOptions of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|497) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/10_opsi.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/10_wim.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/20_legacy.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/30_kiosk.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/30_sshcommands.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/40_admin_tasks.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/40_groupActions.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/45_deprecated.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/70_dynamic_depot.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:28] Reading config file '/etc/opsi/backendManager/extend.d/70_wan.conf' (BackendManager.py|500) | |
[7] [Aug 27 14:16:28] BackendManager is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:28] BackendManager: overwriting method backend_exit of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendManager: overwriting method backend_getInterface of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendManager: overwriting method backend_getOptions of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendManager: overwriting method backend_info of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] BackendManager: overwriting method backend_setOptions of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:28] ExtendedBackend <BackendManager()>: executing 'accessControl_userIsAdmin' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:28] ExtendedBackend <BackendExtender()>: executing 'accessControl_userIsAdmin' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|508) | |
[7] [Aug 27 14:16:28] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fbd6050 (Logger.py|489) | |
[5] [Aug 27 14:16:28] -----> Executing: authenticated() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:28] ExtendedBackend <BackendManager()>: executing 'authenticated' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:28] ExtendedBackend <BackendExtender()>: executing 'accessControl_authenticated' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|508) | |
[6] [Aug 27 14:16:28] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:28] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:28] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f2520036b90>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:28] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:28] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fbdda28 (Logger.py|489) | |
[6] [Aug 27 14:16:28] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:28] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fbdda28> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:28] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:28] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251f600190 (Logger.py|489) | |
[5] [Aug 27 14:16:28] -----> Executing: getRawData(u'select * from SOFTWARE_CONFIG LIMIT 1 ') (JsonRpc.py|128) | |
[7] [Aug 27 14:16:28] ExtendedBackend <BackendManager()>: executing 'getRawData' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:28] ExtendedBackend <BackendExtender()>: executing 'getRawData' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251fe61e10> (Backend.py|508) | |
[7] [Aug 27 14:16:28] Access control for method 'getRawData' with params {'query': u'select * from SOFTWARE_CONFIG LIMIT 1 '} (BackendManager.py|820) | |
[7] [Aug 27 14:16:28] Found matching acl for method 'getRawData': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:28] Method 'getRawData' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:28] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "<string>", line 1, in getRawData | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "<string>", line 1, in getRawData | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "<string>", line 1, in getRawData | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] ==>>> Backend permission denied error: Access to method 'getRawData' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:28] Execution error: Backend permission denied error: Access to method 'getRawData' denied for user 'root' (JsonRpc.py|140) | |
[4] [Aug 27 14:16:28] Failed RPC on u'getRawData' with params [u'select * from SOFTWARE_CONFIG LIMIT 1 ']: <BackendPermissionDeniedError(u"Access to method 'getRawData' denied for user 'root'")> (statistics.py|426) | |
[7] [Aug 27 14:16:28] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:28] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fbdda28>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:28] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:28] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251f641518 (Logger.py|489) | |
[6] [Aug 27 14:16:28] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:28] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251f641518> started processing (Worker.py|250) | |
[5] [Aug 27 14:16:28] Application 'opsi config editor 4.0.7.6.34' on client '172.16.66.209' did not send cookie (workers.py|185) | |
[7] [Aug 27 14:16:28] Trying to get username and password from Authorization header (workers.py|105) | |
[7] [Aug 27 14:16:28] Authorization header found (type: basic) (workers.py|109) | |
[5] [Aug 27 14:16:28] New session created (session.py|77) | |
[7] [Aug 27 14:16:28] Trying to get username and password from Authorization header (workers.py|105) | |
[7] [Aug 27 14:16:28] Authorization header found (type: basic) (workers.py|109) | |
[5] [Aug 27 14:16:28] Authorization request from maal@172.16.66.209 (application: opsi config editor 4.0.7.6.34) (workers.py|217) | |
[6] [Aug 27 14:16:28] Connection from admin network (workers.py|259) | |
[7] [Aug 27 14:16:28] Trying to authenticate by operating system... (BackendManager.py|595) | |
[7] [Aug 27 14:16:28] PAM conversation: query 'login:', type 2 (BackendManager.py|727) | |
[7] [Aug 27 14:16:28] PAM conversation: query 'Password: ', type 1 (BackendManager.py|727) | |
[6] [Aug 27 14:16:28] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/opsiconfd/workers.py", line 269, in _authenticate | |
forceGroups=forceGroups | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 600, in __init__ | |
raise BackendAuthenticationError(forceUnicode(e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:28] ==>>> Backend authentication error: Backend authentication error: PAM authentication failed for user 'maal': ('Authentication failure', 7) (workers.py|290) | |
[7] [Aug 27 14:16:28] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[6] [Aug 27 14:16:28] Session timer <_Timer(Thread-11, stopped 139797143996160)> canceled (Session.py|128) | |
[5] [Aug 27 14:16:28] Session 'xgzeTeBoTuNgYt4H1f0DNb4MZwiNw5er' from ip '172.16.66.209', application 'opsi config editor 4.0.7.6.34' deleted (Session.py|234) | |
[7] [Aug 27 14:16:28] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:28] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251f641518>._setCookie (Worker.py|434) | |
[2] [Aug 27 14:16:28] Traceback: (Logger.py|798) | |
[2] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/OPSI/Service/Worker.py", line 291, in _errback | |
failure.raiseException() | |
(Logger.py|798) | |
[2] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/twisted/internet/defer.py", line 577, in _runCallbacks | |
current.result = callback(current.result, *args, **kw) | |
(Logger.py|798) | |
[2] [Aug 27 14:16:28] File "/usr/lib/python2.7/dist-packages/opsiconfd/workers.py", line 293, in _authenticate | |
raise OpsiAuthenticationError(u"Forbidden: %s" % error) | |
(Logger.py|798) | |
[2] [Aug 27 14:16:28] ==>>> Opsi authentication error: Forbidden: Backend authentication error: Backend authentication error: PAM authentication failed for user 'maal': ('Authentication failure', 7) (Worker.py|293) | |
[7] [Aug 27 14:16:28] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251f641e18 (Logger.py|489) | |
[6] [Aug 27 14:16:28] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:28] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251f641e18> started processing (Worker.py|250) | |
[5] [Aug 27 14:16:28] Application 'opsi config editor 4.0.7.6.34' on client '172.16.66.209' did not send cookie (workers.py|185) | |
[7] [Aug 27 14:16:28] Trying to get username and password from Authorization header (workers.py|105) | |
[7] [Aug 27 14:16:28] Authorization header found (type: basic) (workers.py|109) | |
[5] [Aug 27 14:16:28] New session created (session.py|77) | |
[7] [Aug 27 14:16:28] Trying to get username and password from Authorization header (workers.py|105) | |
[7] [Aug 27 14:16:28] Authorization header found (type: basic) (workers.py|109) | |
[5] [Aug 27 14:16:28] Authorization request from root@172.16.66.209 (application: opsi config editor 4.0.7.6.34) (workers.py|217) | |
[6] [Aug 27 14:16:28] Connection from admin network (workers.py|259) | |
[7] [Aug 27 14:16:28] Trying to authenticate by operating system... (BackendManager.py|595) | |
[7] [Aug 27 14:16:28] PAM conversation: query 'login:', type 2 (BackendManager.py|727) | |
[7] [Aug 27 14:16:28] PAM conversation: query 'Password: ', type 1 (BackendManager.py|727) | |
[7] [Aug 27 14:16:28] Reading groups of user... (BackendManager.py|763) | |
[7] [Aug 27 14:16:28] Primary group of user u'root' is u'root' (BackendManager.py|765) | |
[7] [Aug 27 14:16:28] User u'root' is member of groups: set([u'root']) (BackendManager.py|769) | |
[6] [Aug 27 14:16:28] Operating system authentication successful for user 'root', groups 'root' (BackendManager.py|598) | |
[7] [Aug 27 14:16:28] Trying to lock file '/etc/opsi/opsi.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:28] File '/etc/opsi/opsi.conf' locked after 0 millis (__init__.py|234) | |
[6] [Aug 27 14:16:28] * BackendManager is creating BackendDispatcher (BackendManager.py|204) | |
[6] [Aug 27 14:16:28] Backend context was set to <BackendManager()> (Backend.py|215) | |
[6] [Aug 27 14:16:28] Loading dispatch config file '/etc/opsi/backendManager/dispatch.conf' (BackendManager.py|300) | |
[7] [Aug 27 14:16:28] Trying to lock file '/etc/opsi/backendManager/dispatch.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:28] File '/etc/opsi/backendManager/dispatch.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:28] Trying to lock file '/etc/opsi/backendManager/dispatch.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:28] File '/etc/opsi/backendManager/dispatch.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:28] Read dispatch config from file u'/etc/opsi/backendManager/dispatch.conf': [(u'backend_.*', (u'file', u'mysql', u'opsipxeconfd')), (u'host_.*', (u'file', u'opsipxeconfd')), (u'productOnClient_.*', (u'file', u'opsipxeconfd')), (u'configState_.*', (u'file', u'opsipxeconfd')), (u'license.*', (u'mysql',)), (u'softwareLicense.*', (u'mysql',)), (u'audit.*', (u'mysql',)), (u'.*', (u'file',))] (BackendManager.py|337) | |
[6] [Aug 27 14:16:28] Loading backend config '/etc/opsi/backends/opsipxeconfd.conf' (BackendManager.py|362) | |
[6] [Aug 27 14:16:28] Backend context was set to <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|215) | |
[6] [Aug 27 14:16:28] Loading backend config '/etc/opsi/backends/file.conf' (BackendManager.py|362) | |
[6] [Aug 27 14:16:28] Backend context was set to <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|215) | |
[6] [Aug 27 14:16:28] Loading backend config '/etc/opsi/backends/mysql.conf' (BackendManager.py|362) | |
[6] [Aug 27 14:16:28] Backend context was set to <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|215) | |
[7] [Aug 27 14:16:28] Trying to lock file '/etc/opsi/hwaudit/locales/en_US' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:28] File '/etc/opsi/hwaudit/locales/en_US' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'COMPUTER_SYSTEM' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'CHASSIS' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'BASE_BOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'BIOS' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'SYSTEM_SLOT' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PORT_CONNECTOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PROCESSOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'MEMORY_BANK' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'MEMORY_MODULE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'CACHE_MEMORY' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PCI_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'NETWORK_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'AUDIO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'HDAUDIO_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'IDE_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'SCSI_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'FLOPPY_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'USB_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class '1394_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PCMCIA_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'VIDEO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'FLOPPY_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'TAPE_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'HARDDISK_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'DISK_PARTITION' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'OPTICAL_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'USB_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'MONITOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'KEYBOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'POINTING_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PRINTER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] MySQL created: <MySQL(address=u'localhost')> (MySQL.py|149) | |
[6] [Aug 27 14:16:29] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:29] Missing important information about modules. Probably no modules file installed. (MySQL.py|530) | |
[7] [Aug 27 14:16:29] MySQLBackend created: <MySQLBackend()> (MySQL.py|573) | |
[7] [Aug 27 14:16:29] BackendDispatcher is creating instance methods (BackendManager.py|378) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardwareOnHost_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardwareOnHost_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardwareOnHost_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardwareOnHost_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardwareOnHost_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardware_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardware_getConfig', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardware_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardware_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardware_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditHardware_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareOnClient_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareOnClient_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareOnClient_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareOnClient_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareOnClient_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareToLicensePool_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareToLicensePool_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareToLicensePool_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareToLicensePool_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftwareToLicensePool_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftware_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftware_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftware_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftware_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'audit.*' matches method 'auditSoftware_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'backend_.*' matches method 'backend_createBase', dispatching to backends: file, mysql, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'backend_.*' matches method 'backend_deleteBase', dispatching to backends: file, mysql, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] BackendDispatcher: skipping already present method backend_exit (BackendManager.py|387) | |
[7] [Aug 27 14:16:29] BackendDispatcher: skipping already present method backend_getInterface (BackendManager.py|387) | |
[7] [Aug 27 14:16:29] BackendDispatcher: skipping already present method backend_getOptions (BackendManager.py|387) | |
[7] [Aug 27 14:16:29] u'backend_.*' matches method 'backend_getSystemConfiguration', dispatching to backends: file, mysql, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] BackendDispatcher: skipping already present method backend_info (BackendManager.py|387) | |
[7] [Aug 27 14:16:29] BackendDispatcher: skipping already present method backend_setOptions (BackendManager.py|387) | |
[7] [Aug 27 14:16:29] u'configState_.*' matches method 'configState_deleteObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'configState_.*' matches method 'configState_getHashes', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'configState_.*' matches method 'configState_getObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'configState_.*' matches method 'configState_insertObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'configState_.*' matches method 'configState_updateObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'config_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'config_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'config_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'config_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'config_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'getData', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'getRawData', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'group_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'group_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'group_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'group_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'group_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'host_.*' matches method 'host_deleteObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'host_.*' matches method 'host_getHashes', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'host_.*' matches method 'host_getObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'host_.*' matches method 'host_insertObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'host_.*' matches method 'host_updateObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseContract_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseContract_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseContract_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseContract_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseContract_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseOnClient_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseOnClient_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseOnClient_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseOnClient_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licenseOnClient_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licensePool_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licensePool_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licensePool_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licensePool_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'license.*' matches method 'licensePool_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'log_read', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'log_write', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'objectToGroup_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'objectToGroup_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'objectToGroup_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'objectToGroup_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'objectToGroup_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productDependency_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productDependency_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productDependency_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productDependency_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productDependency_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'productOnClient_.*' matches method 'productOnClient_deleteObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'productOnClient_.*' matches method 'productOnClient_getHashes', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'productOnClient_.*' matches method 'productOnClient_getObjects', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'productOnClient_.*' matches method 'productOnClient_insertObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'productOnClient_.*' matches method 'productOnClient_updateObject', dispatching to backends: file, opsipxeconfd (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productOnDepot_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productOnDepot_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productOnDepot_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productOnDepot_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productOnDepot_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productPropertyState_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productPropertyState_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productPropertyState_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productPropertyState_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productPropertyState_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productProperty_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productProperty_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productProperty_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productProperty_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'productProperty_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'product_deleteObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'product_getHashes', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'product_getObjects', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'product_insertObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'product_updateObject', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicenseToLicensePool_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicense_deleteObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicense_getHashes', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicense_getObjects', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicense_insertObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'softwareLicense.*' matches method 'softwareLicense_updateObject', dispatching to backends: mysql (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'user_getCredentials', dispatching to backends: file (BackendManager.py|400) | |
[7] [Aug 27 14:16:29] u'.*' matches method 'user_setCredentials', dispatching to backends: file (BackendManager.py|400) | |
[6] [Aug 27 14:16:29] * BackendManager is creating ExtendedConfigDataBackend (BackendManager.py|209) | |
[6] [Aug 27 14:16:29] Setting context to backend <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|482) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method auditHardwareOnHost_updateObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method backend_exit of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method backend_getInterface of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method backend_getOptions of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method backend_info of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method backend_setOptions of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method configState_getObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method configState_insertObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method configState_updateObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method productOnClient_getObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method productOnClient_insertObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method productOnClient_updateObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method productOnDepot_deleteObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method productOnDepot_insertObject of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedConfigDataBackend: overwriting method productPropertyState_getObjects of backend instance <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] Dispatching method 'auditHardware_getConfig' to backends: [u'mysql'] (BackendManager.py|412) | |
[7] [Aug 27 14:16:29] Trying to lock file '/etc/opsi/hwaudit/locales/en_US' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/etc/opsi/hwaudit/locales/en_US' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'COMPUTER_SYSTEM' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'CHASSIS' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'BASE_BOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'BIOS' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'SYSTEM_SLOT' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PORT_CONNECTOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PROCESSOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'MEMORY_BANK' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'MEMORY_MODULE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'CACHE_MEMORY' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PCI_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'NETWORK_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'AUDIO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'HDAUDIO_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'IDE_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'SCSI_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'FLOPPY_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'USB_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class '1394_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PCMCIA_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'VIDEO_CONTROLLER' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'FLOPPY_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'TAPE_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'HARDDISK_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'DISK_PARTITION' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'OPTICAL_DRIVE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'USB_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'MONITOR' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'KEYBOARD' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'POINTING_DEVICE' (Backend.py|1600) | |
[7] [Aug 27 14:16:29] Found STRUCTURAL hardware class 'PRINTER' (Backend.py|1600) | |
[6] [Aug 27 14:16:29] * BackendManager is creating DepotserverBackend (BackendManager.py|215) | |
[6] [Aug 27 14:16:29] Setting context to backend <DepotserverBackend()> (Backend.py|482) | |
[7] [Aug 27 14:16:29] DepotserverBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:29] DepotserverBackend: overwriting method backend_exit of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] DepotserverBackend: overwriting method backend_getInterface of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] DepotserverBackend: overwriting method backend_getOptions of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] DepotserverBackend: overwriting method backend_info of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] DepotserverBackend: overwriting method backend_setOptions of backend instance <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedBackend <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)>: executing 'host_getObjects' on backend <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|508) | |
[7] [Aug 27 14:16:29] Dispatching method 'host_getObjects' to backends: [u'file', u'opsipxeconfd'] (BackendManager.py|412) | |
[7] [Aug 27 14:16:29] Getting hosts ... (File.py|1252) | |
[7] [Aug 27 14:16:29] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:29] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:29] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:29] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:29] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:29] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:29] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:29] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:29] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:29] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[7] [Aug 27 14:16:29] Testing match of filter u'kappa.wikimedia.de' of attribute 'id' with value u'kappa.wikimedia.de' (Backend.py|248) | |
[7] [Aug 27 14:16:29] Value u'kappa.wikimedia.de' matched filter u'kappa.wikimedia.de', attribute 'id' (Backend.py|297) | |
[6] [Aug 27 14:16:29] * BackendManager is creating HostControlBackend (BackendManager.py|219) | |
[6] [Aug 27 14:16:29] Setting context to backend <HostControlBackend()> (Backend.py|482) | |
[7] [Aug 27 14:16:29] HostControlBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:29] HostControlBackend: overwriting method backend_exit of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlBackend: overwriting method backend_getInterface of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlBackend: overwriting method backend_getOptions of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlBackend: overwriting method backend_info of backend instance <DepotserverBackend()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlBackend: overwriting method backend_setOptions of backend instance <DepotserverBackend()> (Backend.py|497) | |
[6] [Aug 27 14:16:29] * BackendManager is creating HostControlBackend (BackendManager.py|228) | |
[6] [Aug 27 14:16:29] Setting context to backend <HostControlSafeBackend()> (Backend.py|482) | |
[7] [Aug 27 14:16:29] HostControlSafeBackend is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:29] HostControlSafeBackend: overwriting method backend_exit of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlSafeBackend: overwriting method backend_getInterface of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlSafeBackend: overwriting method backend_getOptions of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlSafeBackend: overwriting method backend_info of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[7] [Aug 27 14:16:29] HostControlSafeBackend: overwriting method backend_setOptions of backend instance <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|497) | |
[6] [Aug 27 14:16:29] * BackendManager is creating BackendAccessControl (BackendManager.py|237) | |
[7] [Aug 27 14:16:29] Trying to authenticate by operating system... (BackendManager.py|595) | |
[7] [Aug 27 14:16:29] PAM conversation: query 'login:', type 2 (BackendManager.py|727) | |
[7] [Aug 27 14:16:29] PAM conversation: query 'Password: ', type 1 (BackendManager.py|727) | |
[7] [Aug 27 14:16:29] Reading groups of user... (BackendManager.py|763) | |
[7] [Aug 27 14:16:29] Primary group of user u'root' is u'root' (BackendManager.py|765) | |
[7] [Aug 27 14:16:29] User u'root' is member of groups: set([u'root']) (BackendManager.py|769) | |
[6] [Aug 27 14:16:29] Operating system authentication successful for user 'root', groups 'root' (BackendManager.py|598) | |
[7] [Aug 27 14:16:29] Trying to lock file '/etc/opsi/backendManager/acl.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/etc/opsi/backendManager/acl.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Trying to lock file '/etc/opsi/backendManager/acl.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/etc/opsi/backendManager/acl.conf' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Read acl from file u'/etc/opsi/backendManager/acl.conf': [[u'backend_deleteBase', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}]], [u'backend_.*', [{'denyAttributes': [], 'type': u'all', 'ids': [], 'allowAttributes': []}]], [u'hostControl.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'host_get.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [u'opsiHostKey', u'description', u'lastSeen', u'notes', u'hardwareAddress', u'inventoryNumber'], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'auditSoftware_delete.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'auditSoftware_.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'auditHardware_delete.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'auditHardware_.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'user_setCredentials', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'user_getCredentials', [{'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'.*_get.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}]], [u'get(Raw){0,1}Data', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}]], [u'.*', [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}]]] (BackendManager.py|633) | |
[6] [Aug 27 14:16:29] * BackendManager is creating BackendExtender (BackendManager.py|241) | |
[6] [Aug 27 14:16:29] Setting context to backend <BackendExtender()> (Backend.py|482) | |
[7] [Aug 27 14:16:29] BackendExtender is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:29] BackendExtender: overwriting method backend_exit of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendExtender: overwriting method backend_getInterface of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendExtender: overwriting method backend_getOptions of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendExtender: overwriting method backend_info of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendExtender: overwriting method backend_setOptions of backend instance <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|497) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/10_opsi.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/10_wim.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/20_legacy.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/30_kiosk.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/30_sshcommands.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/40_admin_tasks.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/40_groupActions.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/45_deprecated.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/70_dynamic_depot.conf' (BackendManager.py|500) | |
[6] [Aug 27 14:16:29] Reading config file '/etc/opsi/backendManager/extend.d/70_wan.conf' (BackendManager.py|500) | |
[7] [Aug 27 14:16:29] BackendManager is creating instance methods (Backend.py|488) | |
[7] [Aug 27 14:16:29] BackendManager: overwriting method backend_exit of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendManager: overwriting method backend_getInterface of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendManager: overwriting method backend_getOptions of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendManager: overwriting method backend_info of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] BackendManager: overwriting method backend_setOptions of backend instance <BackendExtender()> (Backend.py|497) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendManager()>: executing 'accessControl_userIsAdmin' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendExtender()>: executing 'accessControl_userIsAdmin' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd755d0 (Logger.py|489) | |
[5] [Aug 27 14:16:29] -----> Executing: getPossibleMethods_listOfHashes() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendManager()>: executing 'getPossibleMethods_listOfHashes' on backend <BackendExtender()> (Backend.py|508) | |
[6] [Aug 27 14:16:29] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:29] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:29] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251f641e18>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:29] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fda2ef0 (Logger.py|489) | |
[6] [Aug 27 14:16:29] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:29] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fda2ef0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:29] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251f642890 (Logger.py|489) | |
[5] [Aug 27 14:16:29] -----> Executing: getOpsiInformation_hash() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendManager()>: executing 'getOpsiInformation_hash' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:29] Access control for method 'backend_info' with params {} (BackendManager.py|820) | |
[7] [Aug 27 14:16:29] Found matching acl for method 'backend_info': [{'denyAttributes': [], 'type': u'all', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:29] Method 'backend_info' using acls: [{'denyAttributes': [], 'type': u'all', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:29] Full access to method 'backend_info' granted to user u'root' by acl {'denyAttributes': [], 'type': u'all', 'ids': [], 'allowAttributes': []} (BackendManager.py|864) | |
[6] [Aug 27 14:16:29] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:29] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:29] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:29] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fda2ef0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:29] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fda2ef0 (Logger.py|489) | |
[6] [Aug 27 14:16:29] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:29] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fda2ef0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:29] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd75b50 (Logger.py|489) | |
[5] [Aug 27 14:16:29] -----> Executing: host_getObjects([]) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendManager()>: executing 'host_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendExtender()>: executing 'host_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:29] Access control for method 'host_getObjects' with params {'attributes': []} (BackendManager.py|820) | |
[7] [Aug 27 14:16:29] Found matching acl for method 'host_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [u'opsiHostKey', u'description', u'lastSeen', u'notes', u'hardwareAddress', u'inventoryNumber'], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:29] Method 'host_getObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:29] Partial access to method 'host_getObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:29] Filtering params: {'attributes': []} (BackendManager.py|889) | |
[7] [Aug 27 14:16:29] ExtendedBackend <HostControlSafeBackend(resolveHostAddress=False, maxConnections=50)>: executing 'host_getObjects' on backend <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|508) | |
[7] [Aug 27 14:16:29] ExtendedBackend <HostControlBackend(resolveHostAddress=False, maxConnections=50)>: executing 'host_getObjects' on backend <DepotserverBackend()> (Backend.py|508) | |
[7] [Aug 27 14:16:29] ExtendedBackend <DepotserverBackend()>: executing 'host_getObjects' on backend <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|508) | |
[7] [Aug 27 14:16:29] ExtendedBackend <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)>: executing 'host_getObjects' on backend <BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)> (Backend.py|508) | |
[7] [Aug 27 14:16:29] Dispatching method 'host_getObjects' to backends: [u'file', u'opsipxeconfd'] (BackendManager.py|412) | |
[7] [Aug 27 14:16:29] Getting hosts ... (File.py|1252) | |
[7] [Aug 27 14:16:29] Parsing ini file '/var/lib/opsi/config/depots/kappa.wikimedia.de.ini' (__init__.py|518) | |
[7] [Aug 27 14:16:29] Trying to lock file '/var/lib/opsi/config/depots/kappa.wikimedia.de.ini' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/var/lib/opsi/config/depots/kappa.wikimedia.de.ini' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Finished reading file after 0.059 seconds (__init__.py|595) | |
[7] [Aug 27 14:16:29] Trying to lock file '/etc/opsi/pckeys' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/etc/opsi/pckeys' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Trying to lock file '/etc/opsi/pckeys' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/etc/opsi/pckeys' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Parsing ini file '/var/lib/opsi/config/depots/kappa.wikimedia.de.ini' (__init__.py|518) | |
[7] [Aug 27 14:16:29] Trying to lock file '/var/lib/opsi/config/depots/kappa.wikimedia.de.ini' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/var/lib/opsi/config/depots/kappa.wikimedia.de.ini' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Finished reading file after 0.054 seconds (__init__.py|595) | |
[7] [Aug 27 14:16:29] Trying to lock file '/etc/opsi/pckeys' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/etc/opsi/pckeys' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:29] Trying to lock file '/etc/opsi/pckeys' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:29] File '/etc/opsi/pckeys' locked after 0 millis (__init__.py|234) | |
[6] [Aug 27 14:16:29] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:29] 1 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:29] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:29] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:29] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fda2ef0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:29] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd46ef0 (Logger.py|489) | |
[6] [Aug 27 14:16:29] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:29] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:29] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc49590 (Logger.py|489) | |
[5] [Aug 27 14:16:29] -----> Executing: authenticated() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendManager()>: executing 'authenticated' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:29] ExtendedBackend <BackendExtender()>: executing 'accessControl_authenticated' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[6] [Aug 27 14:16:29] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:29] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:29] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:29] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:29] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd46ef0 (Logger.py|489) | |
[6] [Aug 27 14:16:29] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:29] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc34290 (Logger.py|489) | |
[5] [Aug 27 14:16:30] -----> Executing: config_getObjects([]) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'config_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendExtender()>: executing 'config_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:30] Access control for method 'config_getObjects' with params {'attributes': []} (BackendManager.py|820) | |
[7] [Aug 27 14:16:30] Found matching acl for method 'config_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:30] Method 'config_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access to method 'config_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:30] Execution error: Backend permission denied error: Access to method 'config_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd46ef0 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca53d0 (Logger.py|489) | |
[5] [Aug 27 14:16:30] -----> Executing: accessControl_userIsReadOnlyUser() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'accessControl_userIsReadOnlyUser' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendExtender()>: executing 'accessControl_userIsReadOnlyUser' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:30] Trying to lock file '/etc/opsi/opsi.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:30] File '/etc/opsi/opsi.conf' locked after 0 millis (__init__.py|234) | |
[6] [Aug 27 14:16:30] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd46ef0 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca5750 (Logger.py|489) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'config_updateObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendExtender()>: executing 'config_updateObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:30] Access control for method 'config_updateObjects' with params {'configs': [<BoolConfig(id=u'user.{}.register', description=u'the primary value setting is false', defaultValues=[False])>]} (BackendManager.py|820) | |
[7] [Aug 27 14:16:30] Found matching acl for method 'config_updateObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:30] Method 'config_updateObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:30] Partial access to method 'config_updateObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:30] Filtering params: {'configs': [<BoolConfig(id=u'user.{}.register', description=u'the primary value setting is false', defaultValues=[False])>]} (BackendManager.py|889) | |
[6] [Aug 27 14:16:30] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:30] 1 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 871, in _executeMethodProtected | |
newKwargs = self._filterParams(kwargs, acls) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 896, in _filterParams | |
valueList = self._filterObjects(valueList, acls, exceptionOnTruncate=False) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 982, in _filterObjects | |
raise BackendPermissionDeniedError(u"Access denied") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access denied (BackendManager.py|875) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 876, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s': %s" % (methodName, self._username, e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|139) | |
[3] [Aug 27 14:16:30] Execution error: Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|140) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd53290 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd53290> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca5a10 (Logger.py|489) | |
[5] [Aug 27 14:16:30] -----> Executing: getDomain() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'getDomain' on backend <BackendExtender()> (Backend.py|508) | |
[6] [Aug 27 14:16:30] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd53290>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd53b48 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd53b48> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fcc5cd0 (Logger.py|489) | |
[5] [Aug 27 14:16:30] -----> Executing: config_updateObjects([<UnicodeConfig(id=u'configed.domains_given', description=u'saved domains for creating clients', possibleValues=[u'wikimedia.de'], defaultValues=[u'wikimedia.de'], editable=True, multiValue=True)>, <U...) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'config_updateObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendExtender()>: executing 'config_updateObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:30] Access control for method 'config_updateObjects' with params {'configs': [<UnicodeConfig(id=u'configed.domains_given', description=u'saved domains for creating clients', possibleValues=[u'wikimedia.de'], defaultValues=[u'wikimedia.de'], editable=True, multiValue=True)>, <UnicodeConfig(id=u'product_sort_algorithm', description=u'', possibleValues=[u'algorithm1', u'algorithm2'], defaultValues=[], editable=False, multiValue=False)>, <UnicodeConfig(id=u'configed.license_inventory_extradisplayfields', description=u'Zusatzspalten zur Host-Beschreibung\nin der Tabelle "Abgleich mit Inventarisierung"\nBitte nach \xc4nderungen configed neu starten ', possibleValues=[u'description', u'inventoryNumber', u'ipAddress', u'lastSeen', u'notes'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.remote_control.ping_linux', description=u'ping, started in a Linux environment', possibleValues=[u'xterm +hold -e ping %host%'], defaultValues=[u'xterm +hold -e ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_linux.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_linux.description', description=u'', possibleValues=[u'ping, started in a Linux environment'], defaultValues=[u'ping, started in a Linux environment'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'free licences for client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup{user_logged_in}.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_net_connection.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_timer.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <UnicodeConfig(id=u'configed.saved_search.product_failed', description=u'any product failed', possibleValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], defaultValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.saved_search.product_failed.description', description=u'', possibleValues=[u'any product failed'], defaultValues=[u'any product failed'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.user', description=u'default windows username for deploy-client-agent-script', possibleValues=[u'Administrator'], defaultValues=[u'Administrator'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.password', description=u'default windows password for deploy-client-agent-script', possibleValues=[u''], defaultValues=[u''], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.workbench.default', description=u'default path to opsiproducts', possibleValues=[u'/home/opsiproducts/'], defaultValues=[u'/home/opsiproducts/'], editable=True, multiValue=False)>, <BoolConfig(id=u'user.{}.ssh.menu_serverconsole.active', description=u'Aktiviert den Hauptmen\xfceintrag SSH-Konsole', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.terminal.active', description=u'Gibt die Nutzung der SSH-Shell frei', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.serverconfiguration.active', description=u'Aktiviert Konfiguration der SSH-Verbindungsparameter', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.commandmanagement.active', description=u'Aktiviert die Bearbeitung von Men\xfceintr\xe4gen f\xfcr SSH-Konsolen-Befehle', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.commands.active', description=u'Schaltet die konfigurierten SSH-Men\xfcbefehle frei', defaultValues=[True])>, <UnicodeConfig(id=u'configed.opsiclientd_events', description=u'', possibleValues=[u'on_demand', u'silent_install'], defaultValues=[u'on_demand'], editable=True, multiValue=True)>]} (BackendManager.py|820) | |
[7] [Aug 27 14:16:30] Found matching acl for method 'config_updateObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:30] Method 'config_updateObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:30] Partial access to method 'config_updateObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:30] Filtering params: {'configs': [<UnicodeConfig(id=u'configed.domains_given', description=u'saved domains for creating clients', possibleValues=[u'wikimedia.de'], defaultValues=[u'wikimedia.de'], editable=True, multiValue=True)>, <UnicodeConfig(id=u'product_sort_algorithm', description=u'', possibleValues=[u'algorithm1', u'algorithm2'], defaultValues=[], editable=False, multiValue=False)>, <UnicodeConfig(id=u'configed.license_inventory_extradisplayfields', description=u'Zusatzspalten zur Host-Beschreibung\nin der Tabelle "Abgleich mit Inventarisierung"\nBitte nach \xc4nderungen configed neu starten ', possibleValues=[u'description', u'inventoryNumber', u'ipAddress', u'lastSeen', u'notes'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.remote_control.ping_linux', description=u'ping, started in a Linux environment', possibleValues=[u'xterm +hold -e ping %host%'], defaultValues=[u'xterm +hold -e ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_linux.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_linux.description', description=u'', possibleValues=[u'ping, started in a Linux environment'], defaultValues=[u'ping, started in a Linux environment'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'free licences for client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup{user_logged_in}.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_net_connection.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_timer.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <UnicodeConfig(id=u'configed.saved_search.product_failed', description=u'any product failed', possibleValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], defaultValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.saved_search.product_failed.description', description=u'', possibleValues=[u'any product failed'], defaultValues=[u'any product failed'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.user', description=u'default windows username for deploy-client-agent-script', possibleValues=[u'Administrator'], defaultValues=[u'Administrator'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.password', description=u'default windows password for deploy-client-agent-script', possibleValues=[u''], defaultValues=[u''], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.workbench.default', description=u'default path to opsiproducts', possibleValues=[u'/home/opsiproducts/'], defaultValues=[u'/home/opsiproducts/'], editable=True, multiValue=False)>, <BoolConfig(id=u'user.{}.ssh.menu_serverconsole.active', description=u'Aktiviert den Hauptmen\xfceintrag SSH-Konsole', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.terminal.active', description=u'Gibt die Nutzung der SSH-Shell frei', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.serverconfiguration.active', description=u'Aktiviert Konfiguration der SSH-Verbindungsparameter', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.commandmanagement.active', description=u'Aktiviert die Bearbeitung von Men\xfceintr\xe4gen f\xfcr SSH-Konsolen-Befehle', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.commands.active', description=u'Schaltet die konfigurierten SSH-Men\xfcbefehle frei', defaultValues=[True])>, <UnicodeConfig(id=u'configed.opsiclientd_events', description=u'', possibleValues=[u'on_demand', u'silent_install'], defaultValues=[u'on_demand'], editable=True, multiValue=True)>]} (BackendManager.py|889) | |
[6] [Aug 27 14:16:30] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:30] 29 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 871, in _executeMethodProtected | |
newKwargs = self._filterParams(kwargs, acls) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 896, in _filterParams | |
valueList = self._filterObjects(valueList, acls, exceptionOnTruncate=False) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 982, in _filterObjects | |
raise BackendPermissionDeniedError(u"Access denied") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access denied (BackendManager.py|875) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 876, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s': %s" % (methodName, self._username, e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|139) | |
[3] [Aug 27 14:16:30] Execution error: Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|140) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd53b48>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb51bd8 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb51bd8> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fcbae90 (Logger.py|489) | |
[5] [Aug 27 14:16:30] -----> Executing: config_updateObjects(<UnicodeConfig(id=u'configed.productonclient_displayfields_localboot', description=u'', possibleValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'position', u'priority', u'produc...) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'config_updateObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendExtender()>: executing 'config_updateObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:30] Access control for method 'config_updateObjects' with params {'configs': <UnicodeConfig(id=u'configed.productonclient_displayfields_localboot', description=u'', possibleValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'position', u'priority', u'productId', u'productName', u'stateChange', u'targetConfiguration', u'versionInfo'], defaultValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'productId', u'versionInfo'], editable=False, multiValue=True)>} (BackendManager.py|820) | |
[7] [Aug 27 14:16:30] Found matching acl for method 'config_updateObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:30] Method 'config_updateObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:30] Partial access to method 'config_updateObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:30] Filtering params: {'configs': <UnicodeConfig(id=u'configed.productonclient_displayfields_localboot', description=u'', possibleValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'position', u'priority', u'productId', u'productName', u'stateChange', u'targetConfiguration', u'versionInfo'], defaultValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'productId', u'versionInfo'], editable=False, multiValue=True)>} (BackendManager.py|889) | |
[6] [Aug 27 14:16:30] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:30] 1 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 871, in _executeMethodProtected | |
newKwargs = self._filterParams(kwargs, acls) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 896, in _filterParams | |
valueList = self._filterObjects(valueList, acls, exceptionOnTruncate=False) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 982, in _filterObjects | |
raise BackendPermissionDeniedError(u"Access denied") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access denied (BackendManager.py|875) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 876, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s': %s" % (methodName, self._username, e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|139) | |
[3] [Aug 27 14:16:30] Execution error: Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|140) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb51bd8>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb4df80 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4df80> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fce0f90 (Logger.py|489) | |
[5] [Aug 27 14:16:30] -----> Executing: config_updateObjects(<UnicodeConfig(id=u'configed.productonclient_displayfields_netboot', description=u'', possibleValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'position', u'priority', u'productI...) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'config_updateObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendExtender()>: executing 'config_updateObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:30] Access control for method 'config_updateObjects' with params {'configs': <UnicodeConfig(id=u'configed.productonclient_displayfields_netboot', description=u'', possibleValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'position', u'priority', u'productId', u'productName', u'stateChange', u'targetConfiguration', u'versionInfo'], defaultValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'productId', u'versionInfo'], editable=False, multiValue=True)>} (BackendManager.py|820) | |
[7] [Aug 27 14:16:30] Found matching acl for method 'config_updateObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:30] Method 'config_updateObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:30] Partial access to method 'config_updateObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:30] Filtering params: {'configs': <UnicodeConfig(id=u'configed.productonclient_displayfields_netboot', description=u'', possibleValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'position', u'priority', u'productId', u'productName', u'stateChange', u'targetConfiguration', u'versionInfo'], defaultValues=[u'actionRequest', u'installationInfo', u'installationStatus', u'productId', u'versionInfo'], editable=False, multiValue=True)>} (BackendManager.py|889) | |
[6] [Aug 27 14:16:30] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:30] 1 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 871, in _executeMethodProtected | |
newKwargs = self._filterParams(kwargs, acls) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 896, in _filterParams | |
valueList = self._filterObjects(valueList, acls, exceptionOnTruncate=False) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 982, in _filterObjects | |
raise BackendPermissionDeniedError(u"Access denied") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access denied (BackendManager.py|875) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 876, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s': %s" % (methodName, self._username, e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|139) | |
[3] [Aug 27 14:16:30] Execution error: Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|140) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4df80>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb503f8 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb503f8> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:30] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fcc5ad0 (Logger.py|489) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendManager()>: executing 'group_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:30] ExtendedBackend <BackendExtender()>: executing 'group_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:30] Access control for method 'group_getObjects' with params {'attributes': [], 'type': u'HostGroup'} (BackendManager.py|820) | |
[7] [Aug 27 14:16:30] Found matching acl for method 'group_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:30] Method 'group_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:30] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 132, in execute | |
self.result = eval("instance.%s(*params, **keywords)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in group_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in group_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "<string>", line 1, in group_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:30] ==>>> Backend permission denied error: Access to method 'group_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:30] Execution error: Backend permission denied error: Access to method 'group_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[7] [Aug 27 14:16:30] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:30] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb503f8>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:30] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:30] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb503f8 (Logger.py|489) | |
[6] [Aug 27 14:16:30] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:30] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb503f8> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:31] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc49710 (Logger.py|489) | |
[5] [Aug 27 14:16:31] -----> Executing: group_createHostGroup(u'clientdirectory', u'root of directory', u'', None) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendManager()>: executing 'group_createHostGroup' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendExtender()>: executing 'group_createHostGroup' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:31] Access control for method 'group_createHostGroup' with params {'notes': u'', 'parentGroupId': None, 'id': u'clientdirectory', 'description': u'root of directory'} (BackendManager.py|820) | |
[7] [Aug 27 14:16:31] Found matching acl for method 'group_createHostGroup': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:31] Method 'group_createHostGroup' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:31] Partial access to method 'group_createHostGroup' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:31] Filtering params: {'notes': u'', 'parentGroupId': None, 'id': u'clientdirectory', 'description': u'root of directory'} (BackendManager.py|889) | |
[7] [Aug 27 14:16:31] ExtendedBackend <HostControlSafeBackend(resolveHostAddress=False, maxConnections=50)>: executing 'group_createHostGroup' on backend <HostControlBackend(resolveHostAddress=False, maxConnections=50)> (Backend.py|508) | |
[7] [Aug 27 14:16:31] ExtendedBackend <HostControlBackend(resolveHostAddress=False, maxConnections=50)>: executing 'group_createHostGroup' on backend <DepotserverBackend()> (Backend.py|508) | |
[7] [Aug 27 14:16:31] ExtendedBackend <DepotserverBackend()>: executing 'group_createHostGroup' on backend <ExtendedConfigDataBackend(configDataBackend=<BackendDispatcher(dispatchConfigFile=u'/etc/opsi/backendManager/dispatch.conf', context=<BackendManager()>)>)> (Backend.py|508) | |
[6] [Aug 27 14:16:31] Creating group '<HostGroup(id=u'clientdirectory', parentGroupId=None>' (Backend.py|3616) | |
[7] [Aug 27 14:16:31] Dispatching method 'group_insertObject' to backends: [u'file'] (BackendManager.py|412) | |
[7] [Aug 27 14:16:31] Inserting group: 'clientdirectory' (File.py|1500) | |
[7] [Aug 27 14:16:31] Creating file: '/var/lib/opsi/config/clientgroups.ini' (File.py|288) | |
[7] [Aug 27 14:16:31] Cannot create existing file, only setting rights. (File.py|293) | |
[7] [Aug 27 14:16:31] Setting rights for path '/var/lib/opsi/config/clientgroups.ini' (File.py|263) | |
[7] [Aug 27 14:16:31] Setting rights on file '/var/lib/opsi/config/clientgroups.ini' (File.py|266) | |
[7] [Aug 27 14:16:31] Parsing ini file '/var/lib/opsi/config/clientgroups.ini' (__init__.py|518) | |
[7] [Aug 27 14:16:31] Trying to lock file '/var/lib/opsi/config/clientgroups.ini' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:31] File '/var/lib/opsi/config/clientgroups.ini' locked after 0 millis (__init__.py|234) | |
[7] [Aug 27 14:16:31] Finished reading file after 0.001 seconds (__init__.py|595) | |
[7] [Aug 27 14:16:31] Trying to lock file '/var/lib/opsi/config/clientgroups.ini' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:31] File '/var/lib/opsi/config/clientgroups.ini' locked after 0 millis (__init__.py|234) | |
[6] [Aug 27 14:16:31] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:31] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:31] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb503f8>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:31] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb4bf80 (Logger.py|489) | |
[6] [Aug 27 14:16:31] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:31] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4bf80> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:31] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc346d0 (Logger.py|489) | |
[5] [Aug 27 14:16:31] -----> Executing: objectToGroup_getObjects() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendManager()>: executing 'objectToGroup_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendExtender()>: executing 'objectToGroup_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:31] Access control for method 'objectToGroup_getObjects' with params {'attributes': []} (BackendManager.py|820) | |
[7] [Aug 27 14:16:31] Found matching acl for method 'objectToGroup_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:31] Method 'objectToGroup_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:31] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in objectToGroup_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in objectToGroup_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in objectToGroup_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] ==>>> Backend permission denied error: Access to method 'objectToGroup_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:31] Execution error: Backend permission denied error: Access to method 'objectToGroup_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[4] [Aug 27 14:16:31] Failed RPC on u'objectToGroup_getObjects' with params []: <BackendPermissionDeniedError(u"Access to method 'objectToGroup_getObjects' denied for user 'root'")> (statistics.py|426) | |
[7] [Aug 27 14:16:31] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:31] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4bf80>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:31] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd535f0 (Logger.py|489) | |
[6] [Aug 27 14:16:31] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:31] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd535f0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:31] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca5c90 (Logger.py|489) | |
[5] [Aug 27 14:16:31] -----> Executing: config_updateObjects(<UnicodeConfig(id=u'configed.host_displayfields', description=u'', possibleValues=[u'UEFIboot', u'WANmode', u'clientConnected', u'clientCreated', u'clientDescription', u'clientHardwareAddress', u'clie...) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendManager()>: executing 'config_updateObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendExtender()>: executing 'config_updateObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:31] Access control for method 'config_updateObjects' with params {'configs': <UnicodeConfig(id=u'configed.host_displayfields', description=u'', possibleValues=[u'UEFIboot', u'WANmode', u'clientConnected', u'clientCreated', u'clientDescription', u'clientHardwareAddress', u'clientIPAddress', u'clientInventoryNumber', u'clientLastSeen', u'clientName', u'clientSessionInfo', u'depotId'], defaultValues=[u'clientConnected', u'clientDescription', u'clientIPAddress', u'clientLastSeen', u'clientName'], editable=False, multiValue=True)>} (BackendManager.py|820) | |
[7] [Aug 27 14:16:31] Found matching acl for method 'config_updateObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:31] Method 'config_updateObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:31] Partial access to method 'config_updateObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:31] Filtering params: {'configs': <UnicodeConfig(id=u'configed.host_displayfields', description=u'', possibleValues=[u'UEFIboot', u'WANmode', u'clientConnected', u'clientCreated', u'clientDescription', u'clientHardwareAddress', u'clientIPAddress', u'clientInventoryNumber', u'clientLastSeen', u'clientName', u'clientSessionInfo', u'depotId'], defaultValues=[u'clientConnected', u'clientDescription', u'clientIPAddress', u'clientLastSeen', u'clientName'], editable=False, multiValue=True)>} (BackendManager.py|889) | |
[6] [Aug 27 14:16:31] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:31] 1 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:31] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 871, in _executeMethodProtected | |
newKwargs = self._filterParams(kwargs, acls) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 896, in _filterParams | |
valueList = self._filterObjects(valueList, acls, exceptionOnTruncate=False) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 982, in _filterObjects | |
raise BackendPermissionDeniedError(u"Access denied") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] ==>>> Backend permission denied error: Access denied (BackendManager.py|875) | |
[6] [Aug 27 14:16:31] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 876, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s': %s" % (methodName, self._username, e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] ==>>> Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|139) | |
[3] [Aug 27 14:16:31] Execution error: Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|140) | |
[7] [Aug 27 14:16:31] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:31] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd535f0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:31] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc79290 (Logger.py|489) | |
[6] [Aug 27 14:16:31] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:31] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fc79290> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:31] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca5790 (Logger.py|489) | |
[5] [Aug 27 14:16:31] -----> Executing: configState_getObjects([]) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendManager()>: executing 'configState_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendExtender()>: executing 'configState_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:31] Access control for method 'configState_getObjects' with params {'attributes': []} (BackendManager.py|820) | |
[7] [Aug 27 14:16:31] Found matching acl for method 'configState_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:31] Method 'configState_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:31] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in configState_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in configState_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "<string>", line 1, in configState_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:31] ==>>> Backend permission denied error: Access to method 'configState_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:31] Execution error: Backend permission denied error: Access to method 'configState_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[7] [Aug 27 14:16:31] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:31] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fc79290>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:31] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd46ef0 (Logger.py|489) | |
[6] [Aug 27 14:16:31] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:31] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:31] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:31] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca5c50 (Logger.py|489) | |
[5] [Aug 27 14:16:31] -----> Executing: SSHCommand_getObjects() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:31] ExtendedBackend <BackendManager()>: executing 'SSHCommand_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:31] Parsing /etc/opsi/server_commands_default.conf (30_sshcommands.conf|65) | |
[7] [Aug 27 14:16:31] Command file '/etc/opsi/server_commands_default.conf' is empty (30_sshcommands.conf|32) | |
[7] [Aug 27 14:16:31] Parsing /var/lib/opsi/server_commands_custom.conf (30_sshcommands.conf|65) | |
[6] [Aug 27 14:16:31] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:31] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:31] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46ef0>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:31] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fda2cf8 (Logger.py|489) | |
[6] [Aug 27 14:16:32] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:32] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fda2cf8> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:32] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca55d0 (Logger.py|489) | |
[5] [Aug 27 14:16:32] -----> Executing: accessControl_userIsReadOnlyUser() (JsonRpc.py|128) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendManager()>: executing 'accessControl_userIsReadOnlyUser' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendExtender()>: executing 'accessControl_userIsReadOnlyUser' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:32] Trying to lock file '/etc/opsi/opsi.conf' (0/2000) (__init__.py|213) | |
[7] [Aug 27 14:16:32] File '/etc/opsi/opsi.conf' locked after 0 millis (__init__.py|234) | |
[6] [Aug 27 14:16:32] Got result (JsonRpc.py|136) | |
[7] [Aug 27 14:16:32] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:32] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fda2cf8>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:32] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb56710 (Logger.py|489) | |
[6] [Aug 27 14:16:32] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:32] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb56710> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:32] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca5590 (Logger.py|489) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendManager()>: executing 'config_updateObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendExtender()>: executing 'config_updateObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:32] Access control for method 'config_updateObjects' with params {'configs': [<BoolConfig(id=u'user.{}.register', description=u'the primary value setting is false', defaultValues=[False])>]} (BackendManager.py|820) | |
[7] [Aug 27 14:16:32] Found matching acl for method 'config_updateObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:32] Method 'config_updateObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:32] Partial access to method 'config_updateObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:32] Filtering params: {'configs': [<BoolConfig(id=u'user.{}.register', description=u'the primary value setting is false', defaultValues=[False])>]} (BackendManager.py|889) | |
[6] [Aug 27 14:16:32] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:32] 1 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:32] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 871, in _executeMethodProtected | |
newKwargs = self._filterParams(kwargs, acls) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 896, in _filterParams | |
valueList = self._filterObjects(valueList, acls, exceptionOnTruncate=False) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 982, in _filterObjects | |
raise BackendPermissionDeniedError(u"Access denied") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] ==>>> Backend permission denied error: Access denied (BackendManager.py|875) | |
[6] [Aug 27 14:16:32] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 876, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s': %s" % (methodName, self._username, e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] ==>>> Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|139) | |
[3] [Aug 27 14:16:32] Execution error: Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|140) | |
[7] [Aug 27 14:16:32] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:32] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb56710>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:32] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd46d88 (Logger.py|489) | |
[6] [Aug 27 14:16:32] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:32] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46d88> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:32] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc34c90 (Logger.py|489) | |
[5] [Aug 27 14:16:32] -----> Executing: config_updateObjects([<UnicodeConfig(id=u'product_sort_algorithm', description=u'', possibleValues=[u'algorithm1', u'algorithm2'], defaultValues=[], editable=False, multiValue=False)>, <UnicodeConfig(id=u'configed.license...) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendManager()>: executing 'config_updateObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendExtender()>: executing 'config_updateObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:32] Access control for method 'config_updateObjects' with params {'configs': [<UnicodeConfig(id=u'product_sort_algorithm', description=u'', possibleValues=[u'algorithm1', u'algorithm2'], defaultValues=[], editable=False, multiValue=False)>, <UnicodeConfig(id=u'configed.license_inventory_extradisplayfields', description=u'Zusatzspalten zur Host-Beschreibung\nin der Tabelle "Abgleich mit Inventarisierung"\nBitte nach \xc4nderungen configed neu starten ', possibleValues=[u'description', u'inventoryNumber', u'ipAddress', u'lastSeen', u'notes'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.remote_control.ping_linux', description=u'ping, started in a Linux environment', possibleValues=[u'xterm +hold -e ping %host%'], defaultValues=[u'xterm +hold -e ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_linux.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_linux.description', description=u'', possibleValues=[u'ping, started in a Linux environment'], defaultValues=[u'ping, started in a Linux environment'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'free licences for client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup{user_logged_in}.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_net_connection.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_timer.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <UnicodeConfig(id=u'configed.saved_search.product_failed', description=u'any product failed', possibleValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], defaultValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.saved_search.product_failed.description', description=u'', possibleValues=[u'any product failed'], defaultValues=[u'any product failed'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.user', description=u'default windows username for deploy-client-agent-script', possibleValues=[u'Administrator'], defaultValues=[u'Administrator'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.password', description=u'default windows password for deploy-client-agent-script', possibleValues=[u''], defaultValues=[u''], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.workbench.default', description=u'default path to opsiproducts', possibleValues=[u'/home/opsiproducts/'], defaultValues=[u'/home/opsiproducts/'], editable=True, multiValue=False)>, <BoolConfig(id=u'user.{}.ssh.menu_serverconsole.active', description=u'Aktiviert den Hauptmen\xfceintrag SSH-Konsole', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.terminal.active', description=u'Gibt die Nutzung der SSH-Shell frei', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.serverconfiguration.active', description=u'Aktiviert Konfiguration der SSH-Verbindungsparameter', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.commandmanagement.active', description=u'Aktiviert die Bearbeitung von Men\xfceintr\xe4gen f\xfcr SSH-Konsolen-Befehle', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.commands.active', description=u'Schaltet die konfigurierten SSH-Men\xfcbefehle frei', defaultValues=[True])>]} (BackendManager.py|820) | |
[7] [Aug 27 14:16:32] Found matching acl for method 'config_updateObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:32] Method 'config_updateObjects' using acls: [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|862) | |
[7] [Aug 27 14:16:32] Partial access to method 'config_updateObjects' granted to user u'root' by acls [{'denyAttributes': [], 'type': u'self', 'ids': [], 'allowAttributes': []}] (BackendManager.py|869) | |
[7] [Aug 27 14:16:32] Filtering params: {'configs': [<UnicodeConfig(id=u'product_sort_algorithm', description=u'', possibleValues=[u'algorithm1', u'algorithm2'], defaultValues=[], editable=False, multiValue=False)>, <UnicodeConfig(id=u'configed.license_inventory_extradisplayfields', description=u'Zusatzspalten zur Host-Beschreibung\nin der Tabelle "Abgleich mit Inventarisierung"\nBitte nach \xc4nderungen configed neu starten ', possibleValues=[u'description', u'inventoryNumber', u'ipAddress', u'lastSeen', u'notes'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.remote_control.ping_linux', description=u'ping, started in a Linux environment', possibleValues=[u'xterm +hold -e ping %host%'], defaultValues=[u'xterm +hold -e ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_linux.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_linux.description', description=u'', possibleValues=[u'ping, started in a Linux environment'], defaultValues=[u'ping, started in a Linux environment'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'free licences for client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_gui_startup{user_logged_in}.active', description=u'meta configuration for default not wan behaviour', defaultValues=[True])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_net_connection.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <BoolConfig(id=u'configed.meta_config.wan_mode_off.opsiclientd.event_timer.active', description=u'meta configuration for default not wan behaviour', defaultValues=[False])>, <UnicodeConfig(id=u'configed.saved_search.product_failed', description=u'any product failed', possibleValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], defaultValues=[u'{ "version" : "2", "data" : { "element" : null, "elementPath" : null, "operation" : "SoftwareOperation", "dataType" : null, "data" : null, "children" : [ { "element" : "SoftwareActionResultElement", "elementPath" : [ "Product", "Action Result" ], "operation" : "StringEqualsOperation", "dataType" : TextType, "data" : "failed", "children" : null } ] } }'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.saved_search.product_failed.description', description=u'', possibleValues=[u'any product failed'], defaultValues=[u'any product failed'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.remote_control.ping_windows', description=u'ping, started in a Windows terminal', possibleValues=[u'cmd.exe /c start ping %host%'], defaultValues=[u'cmd.exe /c start ping %host%'], editable=True, multiValue=False)>, <BoolConfig(id=u'configed.remote_control.ping_windows.editable', description=u'(command may be edited)', defaultValues=[True])>, <UnicodeConfig(id=u'configed.remote_control.ping_windows.description', description=u'', possibleValues=[u'ping, started in a Windows terminal'], defaultValues=[u'ping, started in a Windows terminal'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.host_actions_disabled', description=u'', possibleValues=[u'add client', u'remove client'], defaultValues=[], editable=False, multiValue=True)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.user', description=u'default windows username for deploy-client-agent-script', possibleValues=[u'Administrator'], defaultValues=[u'Administrator'], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.ssh.deploy-client-agent.default.password', description=u'default windows password for deploy-client-agent-script', possibleValues=[u''], defaultValues=[u''], editable=True, multiValue=False)>, <UnicodeConfig(id=u'configed.workbench.default', description=u'default path to opsiproducts', possibleValues=[u'/home/opsiproducts/'], defaultValues=[u'/home/opsiproducts/'], editable=True, multiValue=False)>, <BoolConfig(id=u'user.{}.ssh.menu_serverconsole.active', description=u'Aktiviert den Hauptmen\xfceintrag SSH-Konsole', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.terminal.active', description=u'Gibt die Nutzung der SSH-Shell frei', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.serverconfiguration.active', description=u'Aktiviert Konfiguration der SSH-Verbindungsparameter', defaultValues=[True])>, <BoolConfig(id=u'user.{}.ssh.commandmanagement.active', description=u'Aktiviert die Bearbeitung von Men\xfceintr\xe4gen f\xfcr SSH-Konsolen-Befehle', defaultValues=[False])>, <BoolConfig(id=u'user.{}.ssh.commands.active', description=u'Schaltet die konfigurierten SSH-Men\xfcbefehle frei', defaultValues=[True])>]} (BackendManager.py|889) | |
[6] [Aug 27 14:16:32] Filtering objects by acls (BackendManager.py|921) | |
[4] [Aug 27 14:16:32] 27 objects removed by acl, 0 objects left (BackendManager.py|980) | |
[6] [Aug 27 14:16:32] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 871, in _executeMethodProtected | |
newKwargs = self._filterParams(kwargs, acls) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 896, in _filterParams | |
valueList = self._filterObjects(valueList, acls, exceptionOnTruncate=False) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 982, in _filterObjects | |
raise BackendPermissionDeniedError(u"Access denied") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] ==>>> Backend permission denied error: Access denied (BackendManager.py|875) | |
[6] [Aug 27 14:16:32] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in config_updateObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 876, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s': %s" % (methodName, self._username, e)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] ==>>> Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|139) | |
[3] [Aug 27 14:16:32] Execution error: Backend permission denied error: Access to method 'config_updateObjects' denied for user 'root': Backend permission denied error: Access denied (JsonRpc.py|140) | |
[7] [Aug 27 14:16:32] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:32] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd46d88>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:32] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fcc8e18 (Logger.py|489) | |
[6] [Aug 27 14:16:32] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:32] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fcc8e18> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:32] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc34290 (Logger.py|489) | |
[5] [Aug 27 14:16:32] -----> Executing: product_getObjects([u'id', u'productVersion', u'packageVersion', u'setupScript', u'updateScript', u'uninstallScript', u'alwaysScript', u'onceScript', u'customScript', u'userLoginScript', u'priority', u'advice', u'name',...) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendManager()>: executing 'product_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendExtender()>: executing 'product_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:32] Access control for method 'product_getObjects' with params {'attributes': [u'id', u'productVersion', u'packageVersion', u'setupScript', u'updateScript', u'uninstallScript', u'alwaysScript', u'onceScript', u'customScript', u'userLoginScript', u'priority', u'advice', u'name', u'description']} (BackendManager.py|820) | |
[7] [Aug 27 14:16:32] Found matching acl for method 'product_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:32] Method 'product_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:32] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in product_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in product_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in product_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] ==>>> Backend permission denied error: Access to method 'product_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:32] Execution error: Backend permission denied error: Access to method 'product_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[7] [Aug 27 14:16:32] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:32] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fcc8e18>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:32] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb4b5a8 (Logger.py|489) | |
[6] [Aug 27 14:16:32] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:32] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4b5a8> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:32] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc49210 (Logger.py|489) | |
[5] [Aug 27 14:16:32] -----> Executing: productOnDepot_getObjects([]) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendManager()>: executing 'productOnDepot_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:32] ExtendedBackend <BackendExtender()>: executing 'productOnDepot_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:32] Access control for method 'productOnDepot_getObjects' with params {'attributes': []} (BackendManager.py|820) | |
[7] [Aug 27 14:16:32] Found matching acl for method 'productOnDepot_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:32] Method 'productOnDepot_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:32] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in productOnDepot_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in productOnDepot_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "<string>", line 1, in productOnDepot_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:32] ==>>> Backend permission denied error: Access to method 'productOnDepot_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:32] Execution error: Backend permission denied error: Access to method 'productOnDepot_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[7] [Aug 27 14:16:32] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:32] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4b5a8>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:32] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:32] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb4b5a8 (Logger.py|489) | |
[6] [Aug 27 14:16:32] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:32] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4b5a8> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:33] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:33] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fc34a50 (Logger.py|489) | |
[5] [Aug 27 14:16:33] -----> Executing: getProductOrdering(u'') (JsonRpc.py|128) | |
[7] [Aug 27 14:16:33] ExtendedBackend <BackendManager()>: executing 'getProductOrdering' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:33] ExtendedBackend <BackendExtender()>: executing 'config_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:33] Access control for method 'config_getObjects' with params {'attributes': [], 'id': 'product_sort_algorithm'} (BackendManager.py|820) | |
[7] [Aug 27 14:16:33] Found matching acl for method 'config_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:33] Method 'config_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:33] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in getProductOrdering | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/etc/opsi/backendManager/extend.d/10_opsi.conf", line 89, in getProductOrdering | |
configs = self.config_getObjects(id="product_sort_algorithm") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in config_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in config_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] ==>>> Backend permission denied error: Access to method 'config_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:33] Execution error: Backend permission denied error: Access to method 'config_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[4] [Aug 27 14:16:33] Failed RPC on u'getProductOrdering' with params [u'']: <BackendPermissionDeniedError(u"Access to method 'config_getObjects' denied for user 'root'")> (statistics.py|426) | |
[7] [Aug 27 14:16:33] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:33] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4b5a8>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:33] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:33] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fb4b5a8 (Logger.py|489) | |
[6] [Aug 27 14:16:33] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:33] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4b5a8> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:33] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:33] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fca5990 (Logger.py|489) | |
[5] [Aug 27 14:16:33] -----> Executing: productProperty_getObjects([]) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:33] ExtendedBackend <BackendManager()>: executing 'productProperty_getObjects' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:33] ExtendedBackend <BackendExtender()>: executing 'productProperty_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:33] Access control for method 'productProperty_getObjects' with params {'attributes': []} (BackendManager.py|820) | |
[7] [Aug 27 14:16:33] Found matching acl for method 'productProperty_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:33] Method 'productProperty_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:33] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in productProperty_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in productProperty_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in productProperty_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] ==>>> Backend permission denied error: Access to method 'productProperty_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:33] Execution error: Backend permission denied error: Access to method 'productProperty_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[7] [Aug 27 14:16:33] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:33] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fb4b5a8>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:33] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
[7] [Aug 27 14:16:33] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fd5a320 (Logger.py|489) | |
[6] [Aug 27 14:16:33] Failed to read opsi modules file '/etc/opsi/modules': [Errno 2] No such file or directory: u'/etc/opsi/modules' (Backend.py|444) | |
[6] [Aug 27 14:16:33] Worker <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd5a320> started processing (Worker.py|250) | |
[6] [Aug 27 14:16:33] Reusing session for client '172.16.66.209', application 'opsi config editor 4.0.7.6.34' (Worker.py|396) | |
[7] [Aug 27 14:16:33] Now using log-file '/var/log/opsi/opsiconfd/172.16.66.209.log' for object 0x7f251fce0e10 (Logger.py|489) | |
[5] [Aug 27 14:16:33] -----> Executing: getProductOrdering(None) (JsonRpc.py|128) | |
[7] [Aug 27 14:16:33] ExtendedBackend <BackendManager()>: executing 'getProductOrdering' on backend <BackendExtender()> (Backend.py|508) | |
[7] [Aug 27 14:16:33] ExtendedBackend <BackendExtender()>: executing 'config_getObjects' on backend <OPSI.Backend.BackendManager.BackendAccessControl object at 0x7f251f6c93d0> (Backend.py|508) | |
[7] [Aug 27 14:16:33] Access control for method 'config_getObjects' with params {'attributes': [], 'id': 'product_sort_algorithm'} (BackendManager.py|820) | |
[7] [Aug 27 14:16:33] Found matching acl for method 'config_getObjects': [{'denyAttributes': [], 'type': u'sys_group', 'ids': [u'opsiadmin'], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_depotserver', 'ids': [], 'allowAttributes': []}, {'denyAttributes': [], 'type': u'opsi_client', 'ids': [], 'allowAttributes': []}] (BackendManager.py|827) | |
[7] [Aug 27 14:16:33] Method 'config_getObjects' using acls: [] (BackendManager.py|862) | |
[6] [Aug 27 14:16:33] Traceback: (Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Service/JsonRpc.py", line 134, in execute | |
self.result = eval("instance.%s(*params)" % self.getMethodName()) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in <module> | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in getProductOrdering | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/etc/opsi/backendManager/extend.d/10_opsi.conf", line 89, in getProductOrdering | |
configs = self.config_getObjects(id="product_sort_algorithm") | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in config_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/Backend.py", line 510, in _executeMethod | |
return meth(**kwargs) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "<string>", line 1, in config_getObjects | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] File "/usr/lib/python2.7/dist-packages/OPSI/Backend/BackendManager.py", line 867, in _executeMethodProtected | |
raise BackendPermissionDeniedError(u"Access to method '%s' denied for user '%s'" % (methodName, self._username)) | |
(Logger.py|798) | |
[6] [Aug 27 14:16:33] ==>>> Backend permission denied error: Access to method 'config_getObjects' denied for user 'root' (JsonRpc.py|139) | |
[3] [Aug 27 14:16:33] Execution error: Backend permission denied error: Access to method 'config_getObjects' denied for user 'root' (JsonRpc.py|140) | |
[4] [Aug 27 14:16:33] Failed RPC on u'getProductOrdering' with params [None]: <BackendPermissionDeniedError(u"Access to method 'config_getObjects' denied for user 'root'")> (statistics.py|426) | |
[7] [Aug 27 14:16:33] Sending deflated data (backwards compatible - with content-encoding 'gzip') (Worker.py|637) | |
[7] [Aug 27 14:16:33] <opsiconfd.workers.WorkerOpsiconfdJsonRpc instance at 0x7f251fd5a320>._setCookie (Worker.py|434) | |
[7] [Aug 27 14:16:33] Freeing session <OpsiconfdSession(<opsiconfd.session.OpsiconfdSessionHandler object at 0x7f2515551450>, name=u'OPSISID', sessionMaxInactiveInterval=120> (Worker.py|318) | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment