Hi, I have a problem with oauth service after upgradeing from 6.4.x to 
6.5.x or 6.6-RC5.

The service is defined as follows:
{ 
   "@class" : 
"org.apereo.cas.support.oauth.services.OAuthRegisteredService", 
   "clientId": "praktyki", 
   "clientSecret": "***", 
   "bypassApprovalPrompt": true, 
   "serviceId" : "^https?://someservice*", 
   "name" : "praktyki", 
   "jsonFormat" : true, 
   "id" : 3, 
   "evaluationOrder" : 3, 
       "supportedGrantTypes" : [ "java.util.HashSet", [ 
"authorization_code", "password", "client_credentials", "refresh_token" ] 
], 
       "supportedResponseTypes" : [ "java.util.HashSet", [ "code", "token" 
] ], 
   "usernameAttributeProvider" : { 
       "@class" : 
"org.apereo.cas.services.PrincipalAttributeRegisteredServiceUsernameProvider", 

       "usernameAttribute" : "uidNumber" 
   }, 
   "attributeReleasePolicy" : { 
       "@class" : 
"org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy", 
       "allowedAttributes" : [ "java.util.ArrayList", [ "uidNumber", "sn", 
"givenName", "displayName", "mail", "eduPersonAffiliation", 
"distinguishedName", "memberOf" ] ] 
   } 
}

After successful login application tries to query for attributes of 
authenticated user, but then it seems that CAS cannot resolve username.
The following warning is logged: 

2022-08-01 16:46:42,429 WARN 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
- <Principal resolution is set to resolve users via attribute(s) 
[sAMAccountName], and 
yet the collection of attributes retrieved 
[[urn:oid:1.3.6.1.4.1.25178.1.2.9, credentialClass, credentialId, 
schacHomeOrganization, username]] do not contain any of those attributes. 
This is likely due
to misconfiguration and CAS will use [praktyki] as the final principal id>

The conversation is as follows:

1. Application redirects to cas:
https://login.umcs.pl/oauth2.0/authorize?response_type=code&client_id=praktyki&redirect_uri=https://praktyki.umcs.lublin.pl/authusos/callback
2. CAS makes redirect to:
https://login.umcs.pl/login?service=https%3A%2F%2Flogin.umcs.pl%2Foauth2.0%2FcallbackAuthorize%3Fclient_id%3Dpraktyki%26redirect_uri%3Dhttps%253A%252F%252Fpraktyki.umcs.lublin.pl%252Fauthusos%252Fcallback%26response_type%3Dcode%26client_name%3DCasOAuthClient
3. CAS makes yet another redirect to:
https://login.umcs.pl/oauth2.0/callbackAuthorize?client_id=praktyki&redirect_uri=https%3A%2F%2Fpraktyki.umcs.lublin.pl%2Fauthusos%2Fcallback&response_type=code&client_name=CasOAuthClient&ticket=ST-11-WE9U1qx5iZD1-4KvAg2dKtApfjM-login.umcs.pl
4. CAS redirects to:
https://login.umcs.pl/oauth2.0/authorize?response_type=code&client_id=praktyki&redirect_uri=https://praktyki.umcs.lublin.pl/authusos/callback
5. CAS redirects back to the application:
https://praktyki.umcs.lublin.pl/authusos/callback?code=OC-13-aNSdcGkMW0eC93vYMI-0esZgpXws4AB2
6. Application makes accessToken requests, but cas responds with error 500:
GET 
/oauth2.0/accessToken?client_id=praktyki&client_secret=***&code=OC-13-aNSdcGkMW0eC93vYMI-0esZgpXws4AB2&grant_type=autho
rization_code&redirect_uri=https://praktyki.umcs.lublin.pl/authusos/token 
HTTP/1.1" 500

Do I have sth misconfigured or is it some new bug?

The detailed log is below?

cas_1    | DEBUG [org.apereo.cas.support.oauth.util.OAuth20Utils] Response 
type: [code]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [praktyki]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [wekan]
cas_1    | DEBUG 
[org.apereo.cas.oidc.web.OidcAuthenticationAuthorizeSecurityLogic] Located 
OpenID Connect prompts from request as [[]]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [praktyki]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [wekan]
cas_1    | DEBUG [org.apereo.cas.ticket.registry.RedisTicketRegistry] 
Updating ticket 
[TransientSessionTicketImpl(super=TST-96005b5b-07d2-4036-b11e-c62aab27cf01, 
service=null, 
properties={ticketGrantingTicketId=TGT-1-********NzxO8k-login.umcs.pl, 
pac4jUserProfiles={CasOAuthClient=#CasProfile# | id: 2848 | attributes: { 
oauthClientId=praktyki, eduPersonAffiliation=[staff, employee], 
sAMAccountName=[rom3314],  uidNumber=[2848],   ,} | roles: [] | 
permissions: [] | isRemembered: false | clientName: CasOAuthClient | 
linkedId: null |}, bypass_approval_prompt=true})]
cas_1    | DEBUG [org.apereo.cas.ticket.registry.RedisTicketRegistry] 
Fetched redis key [CAS_TICKET:TST-96005b5b-07d2-4036-b11e-c62aab27cf01:*] 
for ticket 
[TransientSessionTicketImpl(super=TST-96005b5b-07d2-4036-b11e-c62aab27cf01, 
service=null, 
properties={ticketGrantingTicketId=TGT-1-********NzxO8k-login.umcs.pl, 
pac4jUserProfiles={CasOAuthClient=#CasProfile# | id: 2848 | attributes: { 
oauthClientId=praktyki, eduPersonAffiliation=[staff, employee], 
sAMAccountName=[rom3314],  uidNumber=[2848],   ,} | roles: [] | 
permissions: [] | isRemembered: false | clientName: CasOAuthClient | 
linkedId: null |}, bypass_approval_prompt=true})]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.authenticator.OAuth20DefaultCasAuthenticationBuilder]
 
Created final principal [SimplePrincipal(id=2848, attributes={ 
 eduPersonAffiliation=[staff, employee],   , oauthClientId=[praktyki], 
sAMAccountName=[rom3314],, uidNumber=[2848]})] after filtering attributes 
based on 
[OAuthRegisteredService(super=BaseRegisteredService(serviceId=^https?://praktyki(-test)?.umcs.lublin.pl.*,
 
name=praktyki, theme=null, locale=null, informationUrl=null, 
privacyUrl=null, responseType=null, id=3, description=null, 
expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
 
notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
ticketGrantingTicketExpirationPolicy=null, evaluationOrder=3, 
usernameAttributeProvider=PrincipalAttributeRegisteredServiceUsernameProvider(usernameAttribute=uidNumber),
 
logoutType=BACK_CHANNEL, environments=[], 
attributeReleasePolicy=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
 
principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
excludedAttributes=null, includeOnlyAttributes=null, order=0, 
excludedServices=null), authorizedToReleaseCredentialPassword=false, 
authorizedToReleaseProxyGrantingTicket=false, 
excludeDefaultAttributes=false, 
authorizedToReleaseAuthenticationAttributes=true, 
principalIdAttribute=null, order=0), allowedAttributes=[uidNumber, sn, 
givenName, displayName, mail, eduPersonAffiliation, distinguishedName, 
memberOf, sAMAccountName]), 
multifactorAuthenticationPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
 
failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
principalAttributeValueToMatch=null, bypassEnabled=false, 
forceExecution=false, bypassTrustedDeviceEnabled=false, 
bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
script=null), publicKey=null, 
matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=^https?://praktyki(-test)?.umcs.lublin.pl.*),
 
logo=null, logoutUrl=null, 
accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
 
permitUndefined=true, exclusive=false, selectionStrategy=null), 
requireAllAttributes=true, requiredAttributes={}, rejectedAttributes={}, 
caseInsensitive=false), 
authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
 
excludedAuthenticationHandlers=[], 
criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
 
properties={}, contacts=[]), clientSecret=********, clientId=praktyki, 
bypassApprovalPrompt=true, generateRefreshToken=false, 
renewRefreshToken=false, jwtAccessToken=false, codeExpirationPolicy=null, 
accessTokenExpirationPolicy=null, refreshTokenExpirationPolicy=null, 
deviceTokenExpirationPolicy=null, supportedGrantTypes=[refresh_token, 
password, client_credentials, authorization_code], 
supportedResponseTypes=[code, token], userProfileViewType=null)]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.authenticator.OAuth20DefaultCasAuthenticationBuilder]
 
OAuth [state] is [], and [nonce] is []
cas_1    | TRACE 
[org.apereo.cas.services.RegisteredServiceAccessStrategyUtils] Checking 
access strategy for service [praktyki], requested by [2848] with attributes 
[{clientIpAddress=[10.1.0.20], 
bypassedMultifactorAuthenticationProviderId=[mfa-simple], 
bypassMultifactorAuthentication=[true], serverIpAddress=[172.24.0.4], 
userAgent=[Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like 
Gecko) Chrome/103.0.0.0 Safari/537.36], permissions=[], roles=[], 
scopes=[], state=[], nonce=[], client_id=[praktyki],   
eduPersonAffiliation=[staff, employee],   , oauthClientId=[praktyki], 
sAMAccountName=[rom3314],, uidNumber=[2848]}].
cas_1    | TRACE 
[org.apereo.cas.services.util.RegisteredServiceAccessStrategyEvaluator] 
Skipping access strategy policy, since no attributes rules are defined
cas_1    | INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] Audit 
trail record BEGIN
cas_1    | =============================================================
cas_1    | WHO: 2848
cas_1    | WHAT: {result=Service Access Granted, 
principal=SimplePrincipal(id=2848, attributes={ 
 eduPersonAffiliation=[staff, employee],   , oauthClientId=[praktyki], 
sAMAccountName=[rom3314],, uidNumber=[2848]}), service=praktyki, 
requiredAttributes={}}
cas_1    | ACTION: SERVICE_ACCESS_ENFORCEMENT_TRIGGERED
cas_1    | APPLICATION: CAS
cas_1    | WHEN: Mon Aug 01 18:11:34 CEST 2022
cas_1    | CLIENT IP ADDRESS: 10.1.0.20
cas_1    | SERVER IP ADDRESS: 172.24.0.4
cas_1    | =============================================================
cas_1    | 
cas_1    | 
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.web.DefaultOAuth20RequestParameterResolver] 
OAuth grant type is [NONE]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.web.DefaultOAuth20RequestParameterResolver] 
OAuth response type is [CODE]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.web.DefaultOAuth20RequestParameterResolver] 
OAuth response type is [NONE]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.web.endpoints.OAuth20AuthorizeEndpointController] 
Building authorization response for grant type [AUTHORIZATION_CODE] with 
scopes [[]] for client id [praktyki]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [praktyki]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [wekan]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.web.response.callback.OAuth20AuthorizationCodeAuthorizationResponseBuilder]
 
Generated OAuth code: [OC-2-********mZEmEIsXRG1W7PITQ0ex]
cas_1    | DEBUG [org.apereo.cas.ticket.registry.RedisTicketRegistry] 
Adding ticket [OC-2-********mZEmEIsXRG1W7PITQ0ex]
cas_1    | DEBUG [org.apereo.cas.ticket.registry.RedisTicketRegistry] 
Updating ticket [TGT-1-********NzxO8k-login.umcs.pl]
cas_1    | DEBUG [org.apereo.cas.ticket.registry.RedisTicketRegistry] 
Fetched redis key [CAS_TICKET:TGT-1-********NzxO8k-login.umcs.pl:rom3314] 
for ticket [TGT-1-********NzxO8k-login.umcs.pl]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.web.response.callback.OAuth20AuthorizationCodeAuthorizationResponseBuilder]
 
Authorize request successful for client [praktyki] with redirect uri 
[https://praktyki.umcs.lublin.pl/authusos/callback]
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.web.response.callback.OAuth20AuthorizationCodeAuthorizationResponseBuilder]
 
Redirecting to URL [https://praktyki.umcs.lublin.pl/authusos/callback] with 
params [[code]] for clientId [praktyki]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [praktyki]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [wekan]
cas_1    | INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] Audit 
trail record BEGIN
cas_1    | =============================================================
cas_1    | WHO: 2848
cas_1    | WHAT: {code=OC-2-********mZEmEIsXRG1W7PITQ0ex}
cas_1    | ACTION: OAUTH2_CODE_RESPONSE_CREATED
cas_1    | APPLICATION: CAS
cas_1    | WHEN: Mon Aug 01 18:11:34 CEST 2022
cas_1    | CLIENT IP ADDRESS: 10.1.0.20
cas_1    | SERVER IP ADDRESS: 172.24.0.4
cas_1    | =============================================================
cas_1    | 
cas_1    | 
cas_1    | TRACE 
[org.apereo.cas.support.saml.authentication.principal.SamlServiceFactory] 
Request Body: [null]
cas_1    | TRACE 
[org.apereo.cas.support.saml.authentication.principal.SamlServiceFactory] 
Request does not specify a [TARGET] or request body is empty
cas_1    | TRACE 
[org.apereo.cas.services.web.support.RegisteredServiceResponseHeadersEnforcementFilter]
 
Service could not be extracted from request to enforce response headers
cas_1    | TRACE 
[org.apereo.cas.services.web.support.RegisteredServiceResponseHeadersEnforcementFilter]
 
Resolved registered service from request can not be located
cas_1    | TRACE 
[org.apereo.cas.services.web.support.RegisteredServiceResponseHeadersEnforcementFilter]
 
Resolved registered service from request can not be located
cas_1    | TRACE 
[org.apereo.cas.services.web.support.RegisteredServiceResponseHeadersEnforcementFilter]
 
Resolved registered service from request can not be located
cas_1    | TRACE 
[org.apereo.cas.services.web.support.RegisteredServiceResponseHeadersEnforcementFilter]
 
Resolved registered service from request can not be located
cas_1    | TRACE 
[org.apereo.cas.services.web.support.RegisteredServiceResponseHeadersEnforcementFilter]
 
Resolved registered service from request can not be located
cas_1    | TRACE 
[org.apereo.cas.services.web.support.RegisteredServiceResponseHeadersEnforcementFilter]
 
Resolved registered service from request can not be located
cas_1    | TRACE 
[org.apereo.cas.support.saml.authentication.principal.SamlServiceFactory] 
Request Body: [null]
cas_1    | TRACE 
[org.apereo.cas.support.saml.authentication.principal.SamlServiceFactory] 
Request does not specify a [TARGET] or request body is empty
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.authenticator.OAuth20ClientIdClientSecretAuthenticator]
 
Authenticating credential [#UsernamePasswordCredentials# | username: 
praktyki | password: [PROTECTED] |]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [praktyki]
cas_1    | TRACE [org.apereo.cas.services.AbstractServicesManager] No 
environments are assigned to service [wekan]
cas_1    | INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] Audit 
trail record BEGIN
cas_1    | =============================================================
cas_1    | WHO: audit:unknown
cas_1    | WHAT: {result=Service Access Granted, requiredAttributes={}}
cas_1    | ACTION: SERVICE_ACCESS_ENFORCEMENT_TRIGGERED
cas_1    | APPLICATION: CAS
cas_1    | WHEN: Mon Aug 01 18:11:34 CEST 2022
cas_1    | CLIENT IP ADDRESS: 87.246.207.235
cas_1    | SERVER IP ADDRESS: 172.24.0.4
cas_1    | =============================================================
cas_1    | 
cas_1    | 
cas_1    | DEBUG 
[org.apereo.cas.support.oauth.authenticator.OAuth20ClientIdClientSecretAuthenticator]
 
Checking if the OAuth code issued contains code challenge
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.ChainingPrincipalResolver] 
Invoking principal resolver [PersonDirectoryPrincipalResolver]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Extracting credential id based on existing credential 
[UsernamePasswordCredential(username=praktyki, source=null, 
customFields={})]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
No principal is currently resolved and available. Falling back onto using 
the identifier  for the credential, that is [praktyki], for principal 
resolution
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Extracted principal id [praktyki]
cas_1    | DEBUG 
[org.apereo.cas.authentication.attribute.PrincipalAttributeRepositoryFetcher] 
Fetching person attributes for query 
[{credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], username=praktyki}]
cas_1    | DEBUG 
[org.apereo.services.persondir.support.AttributeBasedCacheKeyGenerator] 
Generated cache Map 
{9f089c5d8be0078af193b44cdbe38970a398554a925f664bae70646d7479cbe0f1e1c9829fa03ef39bddf2e7d67c63c4454f5dab72296a997ac42eac2a14c148=[praktyki]}
 
from seed Map {credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], username=[praktyki]}
cas_1    | DEBUG 
[org.apereo.services.persondir.support.AttributeBasedCacheKeyGenerator] 
Generated cache key '-811107522|-811092114' for 
MethodInvocation='org.apereo.services.persondir.support.CachingPersonAttributeDaoImpl$PersonAttributeDaoMethodInvocation@22f2b39f'
cas_1    | DEBUG 
[org.apereo.services.persondir.support.CachingPersonAttributeDaoImpl] 
Retrieved query from cache for cachingAttributeRepository. 
key='getPeopleWithMultivaluedAttributes|-811107522|-811092114', 
results='[AttributeNamedPersonImpl[name=praktyki,attributes={urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl],
 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]]'
cas_1    | DEBUG 
[org.apereo.services.persondir.support.CachingPersonAttributeDaoImpl.statistics]
 
Cache Stats cachingAttributeRepository: queries=5, hits=1, misses=4
cas_1    | DEBUG 
[org.apereo.cas.authentication.attribute.PrincipalAttributeRepositoryFetcher] 
Retrieved person 
[AttributeNamedPersonImpl[name=praktyki,attributes={urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl],
 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]] from attribute repositories for query 
[{credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], username=praktyki}]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Retrieved [5] attribute(s) from the repository
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Found attribute [urn:oid:1.3.6.1.4.1.25178.1.2.9] with value(s) [[umcs.pl]]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Found attribute [credentialClass] with value(s) 
[[OAuth20ClientIdClientSecretCredential]]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Found attribute [credentialId] with value(s) [[praktyki]]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Found attribute [schacHomeOrganization] with value(s) [[umcs.pl]]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Found attribute [username] with value(s) [[praktyki]]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Using principal attributes [{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}] to determine principal id
cas_1    | WARN 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Principal resolution is set to resolve users via attribute(s) 
[sAMAccountName], and yet the collection of attributes retrieved 
[[urn:oid:1.3.6.1.4.1.25178.1.2.9, credentialClass, credentialId, 
schacHomeOrganization, username]] do not contain any of those attributes. 
This is likely due to misconfiguration and CAS will use [praktyki] as the 
final principal id
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.PersonDirectoryPrincipalResolver]
 
Final resolved principal by [PersonDirectoryPrincipalResolver] is 
[SimplePrincipal(id=praktyki, 
attributes={credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], username=[praktyki]})]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.ChainingPrincipalResolver] 
Resolved principal [SimplePrincipal(id=praktyki, 
attributes={credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], username=[praktyki]})]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.ChainingPrincipalResolver] 
Invoking principal resolver [EchoingPrincipalResolver]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.EchoingPrincipalResolver] 
Echoing back the authenticated principal [Optional.empty]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.ChainingPrincipalResolver] 
Resolved principal [SimplePrincipal(id=praktyki, 
attributes={credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], username=[praktyki]})]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.resolvers.ChainingPrincipalResolver] 
Adding attributes 
[{credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], username=[praktyki]}] for the 
final principal
cas_1    | DEBUG [org.apereo.cas.authentication.CoreAuthenticationUtils] 
Merged attributes with the final result as [{credentialId=[praktyki], 
schacHomeOrganization=[umcs.pl], urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
username=[praktyki]}]
cas_1    | DEBUG 
[org.apereo.cas.authentication.SurrogatePrincipalElectionStrategy] 
Calculating principal from principals [[SimplePrincipal(id=praktyki, 
attributes={credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], username=[praktyki]})]]
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.DefaultPrincipalElectionStrategy] 
Final principal constructed by the chain of resolvers is 
[SimplePrincipal(id=praktyki, 
attributes={credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], username=[praktyki]})]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Initiating attributes release phase via 
[ReturnAllowedAttributeReleasePolicy] for principal [praktyki] accessing 
service 
[AbstractWebApplicationService(id=^https?://praktyki(-test)?.umcs.lublin.pl.*, 
originalUrl=^https?://praktyki(-test)?.umcs.lublin.pl.*, artifactId=null, 
principal=null, source=null, loggedOutAlready=false, format=XML, 
attributes={code=[OC-2-********mZEmEIsXRG1W7PITQ0ex], 
client_secret=********], 
redirect_uri=[https://praktyki.umcs.lublin.pl/authusos/token], 
grant_type=[authorization_code], client_id=[praktyki]})] defined by 
registered service [^https?://praktyki(-test)?.umcs.lublin.pl.*]...
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Using principal attribute repository 
[DefaultPrincipalAttributesRepository()] to retrieve attributes
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.RegisteredServicePrincipalAttributesRepository]
 
Using [praktyki], no caching/update takes place for 
[DefaultPrincipalAttributesRepository] to add attributes 
[{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Attributes retrieved from principal attribute repository for [praktyki] are 
[{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Found principal attributes [{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}] for [praktyki]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Retrieving attribute definition store and attribute definitions...
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Finding requested attribute definitions [[uidNumber, sn, givenName, 
displayName, mail, eduPersonAffiliation, distinguishedName, memberOf, 
sAMAccountName, urn:oid:1.3.6.1.4.1.25178.1.2.9, credentialClass, 
credentialId, schacHomeOrganization, username]] based on available 
attributes [{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=sn, 
name=sn, scoped=false, encrypted=false, attribute=null, patternFormat=null, 
script=null, canonicalizationMode=null), friendlyName=sn, 
urn=urn:oid:2.5.4.4)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=givenName, 
name=givenName, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=givenName, urn=urn:oid:2.5.4.42)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=displayName, 
name=displayName, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=displayName, urn=urn:oid:2.16.840.1.113730.3.1.241)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=mail, 
name=mail, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=mail, urn=urn:oid:0.9.2342.19200300.100.1.3)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=eduPersonAffiliation,
 
name=eduPersonAffiliation, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=eduPersonAffiliation, urn=urn:oid:1.3.6.1.4.1.5923.1.1.1.1)]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Resolved principal attributes [{uidNumber=null, distinguishedName=null, 
memberOf=null, sAMAccountName=null, 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}] for [praktyki] from attribute definition store
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.RegisteredServicePrincipalAttributesRepository]
 
Using [praktyki], no caching/update takes place for 
[DefaultPrincipalAttributesRepository] to add attributes [{uidNumber=null, 
distinguishedName=null, memberOf=null, sAMAccountName=null, 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Updating principal attributes repository cache for [praktyki] with 
[{uidNumber=null, distinguishedName=null, memberOf=null, 
sAMAccountName=null, urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Calling attribute policy [ReturnAllowedAttributeReleasePolicy] to process 
attributes for [praktyki]
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [uidNumber] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [distinguishedName] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [memberOf] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [sAMAccountName] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Attribute policy [ReturnAllowedAttributeReleasePolicy] allows release of 
[{sAMAccountName=null, uidNumber=null, distinguishedName=null, 
memberOf=null}] for [praktyki]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Attempting to merge policy attributes and default attributes
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Checking default attribute policy attributes
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Default attributes for release are: [[]]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Default attributes found to be released are [{}]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Adding policy attributes to the released set of attributes
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Finalizing attributes release phase for principal [praktyki] accessing 
service 
[AbstractWebApplicationService(id=^https?://praktyki(-test)?.umcs.lublin.pl.*, 
originalUrl=^https?://praktyki(-test)?.umcs.lublin.pl.*, artifactId=null, 
principal=null, source=null, loggedOutAlready=false, format=XML, 
attributes={code=[OC-2-********mZEmEIsXRG1W7PITQ0ex], 
client_secret=********], 
redirect_uri=[https://praktyki.umcs.lublin.pl/authusos/token], 
grant_type=[authorization_code], client_id=[praktyki]})] defined by 
registered service [^https?://praktyki(-test)?.umcs.lublin.pl.*]...
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Final collection of attributes allowed are: [{distinguishedName=null, 
memberOf=null, sAMAccountName=null, uidNumber=null}]
cas_1    | DEBUG 
[org.apereo.cas.services.PrincipalAttributeRegisteredServiceUsernameProvider] 
Original principal attributes available for selection of username attribute 
[uidNumber] are [{credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], username=[praktyki]}].
cas_1    | DEBUG 
[org.apereo.cas.services.PrincipalAttributeRegisteredServiceUsernameProvider] 
Located service 
[OAuthRegisteredService(super=BaseRegisteredService(serviceId=^https?://praktyki(-test)?.umcs.lublin.pl.*,
 
name=praktyki, theme=null, locale=null, informationUrl=null, 
privacyUrl=null, responseType=null, id=3, description=null, 
expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
 
notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
ticketGrantingTicketExpirationPolicy=null, evaluationOrder=3, 
usernameAttributeProvider=PrincipalAttributeRegisteredServiceUsernameProvider(usernameAttribute=uidNumber),
 
logoutType=BACK_CHANNEL, environments=[], 
attributeReleasePolicy=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
 
principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
excludedAttributes=null, includeOnlyAttributes=null, order=0, 
excludedServices=null), authorizedToReleaseCredentialPassword=false, 
authorizedToReleaseProxyGrantingTicket=false, 
excludeDefaultAttributes=false, 
authorizedToReleaseAuthenticationAttributes=true, 
principalIdAttribute=null, order=0), allowedAttributes=[uidNumber, sn, 
givenName, displayName, mail, eduPersonAffiliation, distinguishedName, 
memberOf, sAMAccountName]), 
multifactorAuthenticationPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
 
failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
principalAttributeValueToMatch=null, bypassEnabled=false, 
forceExecution=false, bypassTrustedDeviceEnabled=false, 
bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
script=null), publicKey=null, 
matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=^https?://praktyki(-test)?.umcs.lublin.pl.*),
 
logo=null, logoutUrl=null, 
accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
 
permitUndefined=true, exclusive=false, selectionStrategy=null), 
requireAllAttributes=true, requiredAttributes={}, rejectedAttributes={}, 
caseInsensitive=false), 
authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
 
excludedAuthenticationHandlers=[], 
criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
 
properties={}, contacts=[]), clientSecret=********, clientId=praktyki, 
bypassApprovalPrompt=true, generateRefreshToken=false, 
renewRefreshToken=false, jwtAccessToken=false, codeExpirationPolicy=null, 
accessTokenExpirationPolicy=null, refreshTokenExpirationPolicy=null, 
deviceTokenExpirationPolicy=null, supportedGrantTypes=[refresh_token, 
password, client_credentials, authorization_code], 
supportedResponseTypes=[code, token], userProfileViewType=null)] in the 
registry. Attempting to resolve attributes for [praktyki]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Initiating attributes release phase via 
[ReturnAllowedAttributeReleasePolicy] for principal [praktyki] accessing 
service 
[AbstractWebApplicationService(id=^https?://praktyki(-test)?.umcs.lublin.pl.*, 
originalUrl=^https?://praktyki(-test)?.umcs.lublin.pl.*, artifactId=null, 
principal=null, source=null, loggedOutAlready=false, format=XML, 
attributes={code=[OC-2-********mZEmEIsXRG1W7PITQ0ex], 
client_secret=********], 
redirect_uri=[https://praktyki.umcs.lublin.pl/authusos/token], 
grant_type=[authorization_code], client_id=[praktyki]})] defined by 
registered service [^https?://praktyki(-test)?.umcs.lublin.pl.*]...
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Using principal attribute repository 
[DefaultPrincipalAttributesRepository()] to retrieve attributes
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.RegisteredServicePrincipalAttributesRepository]
 
Using [praktyki], no caching/update takes place for 
[DefaultPrincipalAttributesRepository] to add attributes 
[{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Attributes retrieved from principal attribute repository for [praktyki] are 
[{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Found principal attributes [{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}] for [praktyki]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Retrieving attribute definition store and attribute definitions...
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Finding requested attribute definitions [[uidNumber, sn, givenName, 
displayName, mail, eduPersonAffiliation, distinguishedName, memberOf, 
sAMAccountName, urn:oid:1.3.6.1.4.1.25178.1.2.9, credentialClass, 
credentialId, schacHomeOrganization, username]] based on available 
attributes [{urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=sn, 
name=sn, scoped=false, encrypted=false, attribute=null, patternFormat=null, 
script=null, canonicalizationMode=null), friendlyName=sn, 
urn=urn:oid:2.5.4.4)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=givenName, 
name=givenName, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=givenName, urn=urn:oid:2.5.4.42)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=displayName, 
name=displayName, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=displayName, urn=urn:oid:2.16.840.1.113730.3.1.241)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=mail, 
name=mail, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=mail, urn=urn:oid:0.9.2342.19200300.100.1.3)]
cas_1    | WARN 
[org.apereo.cas.authentication.attribute.AttributeDefinitionStore] Unable 
to produce or determine attributes values for attribute definition 
[SamlIdPAttributeDefinition(super=DefaultAttributeDefinition(key=eduPersonAffiliation,
 
name=eduPersonAffiliation, scoped=false, encrypted=false, attribute=null, 
patternFormat=null, script=null, canonicalizationMode=null), 
friendlyName=eduPersonAffiliation, urn=urn:oid:1.3.6.1.4.1.5923.1.1.1.1)]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Resolved principal attributes [{uidNumber=null, distinguishedName=null, 
memberOf=null, sAMAccountName=null, 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}] for [praktyki] from attribute definition store
cas_1    | DEBUG 
[org.apereo.cas.authentication.principal.RegisteredServicePrincipalAttributesRepository]
 
Using [praktyki], no caching/update takes place for 
[DefaultPrincipalAttributesRepository] to add attributes [{uidNumber=null, 
distinguishedName=null, memberOf=null, sAMAccountName=null, 
urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Updating principal attributes repository cache for [praktyki] with 
[{uidNumber=null, distinguishedName=null, memberOf=null, 
sAMAccountName=null, urn:oid:1.3.6.1.4.1.25178.1.2.9=[umcs.pl], 
credentialClass=[OAuth20ClientIdClientSecretCredential], 
credentialId=[praktyki], schacHomeOrganization=[umcs.pl], 
username=[praktyki]}]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Calling attribute policy [ReturnAllowedAttributeReleasePolicy] to process 
attributes for [praktyki]
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [uidNumber] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [distinguishedName] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [memberOf] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy] Found 
attribute [sAMAccountName] in the list of allowed attributes
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Attribute policy [ReturnAllowedAttributeReleasePolicy] allows release of 
[{sAMAccountName=null, uidNumber=null, distinguishedName=null, 
memberOf=null}] for [praktyki]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Attempting to merge policy attributes and default attributes
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Checking default attribute policy attributes
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Default attributes for release are: [[]]
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Default attributes found to be released are [{}]
cas_1    | TRACE 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Adding policy attributes to the released set of attributes
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Finalizing attributes release phase for principal [praktyki] accessing 
service 
[AbstractWebApplicationService(id=^https?://praktyki(-test)?.umcs.lublin.pl.*, 
originalUrl=^https?://praktyki(-test)?.umcs.lublin.pl.*, artifactId=null, 
principal=null, source=null, loggedOutAlready=false, format=XML, 
attributes={code=[OC-2-********mZEmEIsXRG1W7PITQ0ex], 
client_secret=********], 
redirect_uri=[https://praktyki.umcs.lublin.pl/authusos/token], 
grant_type=[authorization_code], client_id=[praktyki]})] defined by 
registered service [^https?://praktyki(-test)?.umcs.lublin.pl.*]...
cas_1    | DEBUG 
[org.apereo.cas.services.AbstractRegisteredServiceAttributeReleasePolicy] 
Final collection of attributes allowed are: [{distinguishedName=null, 
memberOf=null, sAMAccountName=null, uidNumber=null}]
cas_1    | DEBUG 
[org.apereo.cas.services.PrincipalAttributeRegisteredServiceUsernameProvider] 
Attributes resolved by the release policy available for selection of 
username attribute [uidNumber] are [{distinguishedName=null, memberOf=null, 
sAMAccountName=null, uidNumber=null}].
cas_1    | DEBUG 
[org.apereo.cas.services.PrincipalAttributeRegisteredServiceUsernameProvider] 
Attribute release policy for registered service 
[^https?://praktyki(-test)?.umcs.lublin.pl.*] contains an attribute for 
[uidNumber]
cas_1    | DEBUG [org.apereo.cas.web.FlowExecutionExceptionResolver] 
Ignoring the received exception [java.lang.IndexOutOfBoundsException: Index 
0 out of bounds for length 0] due to a type mismatch with handler 
[org.apereo.cas.support.oauth.web.endpoints.OAuth20AccessTokenEndpointController#handleGetRequest(HttpServletRequest,
 
HttpServletResponse)]
cas_1    | ERROR 
[org.apache.catalina.core.ContainerBase.[Tomcat].[localhost].[/].[dispatcherServlet]]
 
Servlet.service() for servlet [dispatcherServlet] in context with path [] 
threw exception [Request processing failed; nested exception is 
java.lang.IndexOutOfBoundsException: Index 0 out of bounds for length 0] 
with root cause
cas_1    | java.lang.IndexOutOfBoundsException: Index 0 out of bounds for 
length 0
cas_1    |      at jdk.internal.util.Preconditions.outOfBounds(Unknown 
Source) ~[?:?]
cas_1    |      at 
jdk.internal.util.Preconditions.outOfBoundsCheckIndex(Unknown Source) ~[?:?]
cas_1    |      at jdk.internal.util.Preconditions.checkIndex(Unknown 
Source) ~[?:?]
cas_1    |      at java.util.Objects.checkIndex(Unknown Source) ~[?:?]
cas_1    |      at java.util.ArrayList.get(Unknown Source) ~[?:?]
cas_1    |      at 
org.apereo.cas.services.PrincipalAttributeRegisteredServiceUsernameProvider.resolveUsernameInternal(PrincipalAttributeRegisteredServiceUsernameProvider.java:69)
 
~[cas-server-core-services-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apereo.cas.services.BaseRegisteredServiceUsernameAttributeProvider.resolveUsername(BaseRegisteredServiceUsernameAttributeProvider.java:47)
 
~[cas-server-core-services-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apereo.cas.support.oauth.authenticator.OAuth20ClientIdClientSecretAuthenticator.validate(OAuth20ClientIdClientSecretAuthenticator.java:91)
 
~[cas-server-support-oauth-core-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.pac4j.core.client.BaseClient.lambda$retrieveCredentials$0(BaseClient.java:75)
 
~[pac4j-core-5.4.3.jar!/:?]
cas_1    |      at java.util.Optional.ifPresent(Unknown Source) ~[?:?]
cas_1    |      at 
org.pac4j.core.client.BaseClient.retrieveCredentials(BaseClient.java:72) 
~[pac4j-core-5.4.3.jar!/:?]
cas_1    |      at 
org.pac4j.core.client.DirectClient.getCredentials(DirectClient.java:44) 
~[pac4j-core-5.4.3.jar!/:?]
cas_1    |      at 
org.pac4j.core.engine.DefaultSecurityLogic.perform(DefaultSecurityLogic.java:107)
 
~[pac4j-core-5.4.3.jar!/:?]
cas_1    |      at 
org.pac4j.springframework.web.SecurityInterceptor.preHandle(SecurityInterceptor.java:118)
 
~[spring-webmvc-pac4j-6.0.3.jar!/:?]
cas_1    |      at 
org.apereo.cas.support.oauth.web.OAuth20HandlerInterceptorAdapter.preHandle(OAuth20HandlerInterceptorAdapter.java:62)
 
~[cas-server-support-oauth-core-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apereo.cas.util.spring.RefreshableHandlerInterceptor.lambda$preHandle$0(RefreshableHandlerInterceptor.java:38)
 
~[cas-server-core-util-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.jooq.lambda.Unchecked.lambda$predicate$34(Unchecked.java:1506) 
~[jool-0.9.14.jar!/:?]
cas_1    |      at java.util.stream.MatchOps$1MatchSink.accept(Unknown 
Source) ~[?:?]
cas_1    |      at 
java.util.AbstractList$RandomAccessSpliterator.tryAdvance(Unknown Source) 
~[?:?]
cas_1    |      at 
java.util.stream.ReferencePipeline.forEachWithCancel(Unknown Source) ~[?:?]
cas_1    |      at 
java.util.stream.AbstractPipeline.copyIntoWithCancel(Unknown Source) ~[?:?]
cas_1    |      at java.util.stream.AbstractPipeline.copyInto(Unknown 
Source) ~[?:?]
cas_1    |      at 
java.util.stream.AbstractPipeline.wrapAndCopyInto(Unknown Source) ~[?:?]
cas_1    |      at 
java.util.stream.MatchOps$MatchOp.evaluateSequential(Unknown Source) ~[?:?]
cas_1    |      at 
java.util.stream.MatchOps$MatchOp.evaluateSequential(Unknown Source) ~[?:?]
cas_1    |      at java.util.stream.AbstractPipeline.evaluate(Unknown 
Source) ~[?:?]
cas_1    |      at java.util.stream.ReferencePipeline.allMatch(Unknown 
Source) ~[?:?]
cas_1    |      at 
org.apereo.cas.util.spring.RefreshableHandlerInterceptor.preHandle(RefreshableHandlerInterceptor.java:38)
 
~[cas-server-core-util-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.springframework.web.servlet.HandlerExecutionChain.applyPreHandle(HandlerExecutionChain.java:148)
 
~[spring-webmvc-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1065)
 
~[spring-webmvc-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963)
 
~[spring-webmvc-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006)
 
~[spring-webmvc-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898)
 
~[spring-webmvc-5.3.22.jar!/:5.3.22]
cas_1    |      at 
javax.servlet.http.HttpServlet.service(HttpServlet.java:645) 
~[javax.servlet-api-4.0.1.jar!/:4.0.1]
cas_1    |      at 
org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883)
 
~[spring-webmvc-5.3.22.jar!/:5.3.22]
cas_1    |      at 
javax.servlet.http.HttpServlet.service(HttpServlet.java:750) 
~[javax.servlet-api-4.0.1.jar!/:4.0.1]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.springframework.web.servlet.resource.ResourceUrlEncodingFilter.doFilter(ResourceUrlEncodingFilter.java:67)
 
~[spring-webmvc-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apereo.cas.web.support.AuthenticationCredentialsThreadLocalBinderClearingFilter.doFilter(AuthenticationCredentialsThreadLocalBinderClearingFilter.java:28)
 
~[cas-server-core-web-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apereo.cas.web.support.filters.RequestParameterPolicyEnforcementFilter.doFilter(RequestParameterPolicyEnforcementFilter.java:401)
 
~[cas-server-core-web-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apereo.cas.web.support.filters.ResponseHeadersEnforcementFilter.doFilter(ResponseHeadersEnforcementFilter.java:209)
 
~[cas-server-core-web-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apereo.cas.web.support.filters.AddResponseHeadersFilter.doFilter(AddResponseHeadersFilter.java:62)
 
~[cas-server-core-web-api-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:204)
 
~[spring-security-web-5.7.2.jar!/:5.7.2]
cas_1    |      at 
org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:183)
 
~[spring-security-web-5.7.2.jar!/:5.7.2]
cas_1    |      at 
org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:354)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:267)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96)
 
~[spring-boot-actuator-2.7.2.jar!/:2.7.2]
cas_1    |      at 
org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apereo.cas.logging.web.ThreadContextMDCServletFilter.doFilter(ThreadContextMDCServletFilter.java:104)
 
~[cas-server-core-logging-6.6.0-RC5.jar!/:6.6.0-RC5]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apereo.inspektr.common.web.ClientInfoThreadLocalFilter.doFilter(ClientInfoThreadLocalFilter.java:66)
 
~[inspektr-common-1.8.20.GA.jar!/:?]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117)
 
~[spring-web-5.3.22.jar!/:5.3.22]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:687)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:360) 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:399) 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:890)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1789)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at 
org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
 
~[tomcat-embed-core-9.0.65.jar!/:9.0.65]
cas_1    |      at java.lang.Thread.run(Unknown Source) ~[?:?]

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to cas-user+unsubscr...@apereo.org.
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/3029243d-cf51-4d5d-86d0-ed234b9403dfn%40apereo.org.

Reply via email to