From 822a9fcc3a5d147ee0aed5d320b9e050d73bc559 Mon Sep 17 00:00:00 2001 From: Scott Cantor Date: Tue, 4 Dec 2007 18:27:58 +0000 Subject: [PATCH] Lower log level on metadata failures. --- adfs/adfs.cpp | 6 +++--- shibsp/handler/impl/SAML2SessionInitiator.cpp | 6 +++--- shibsp/handler/impl/Shib1SessionInitiator.cpp | 6 +++--- 3 files changed, 9 insertions(+), 9 deletions(-) diff --git a/adfs/adfs.cpp b/adfs/adfs.cpp index 34e47a0..aed0b32 100644 --- a/adfs/adfs.cpp +++ b/adfs/adfs.cpp @@ -437,18 +437,18 @@ pair ADFSSessionInitiator::doRequest( MetadataProvider::Criteria mc(entityID, &IDPSSODescriptor::ELEMENT_QNAME, m_binding.get()); pair entity=m->getEntityDescriptor(mc); if (!entity.first) { - m_log.error("unable to locate metadata for provider (%s)", entityID); + m_log.warn("unable to locate metadata for provider (%s)", entityID); throw MetadataException("Unable to locate metadata for identity provider ($entityID)", namedparams(1, "entityID", entityID)); } else if (!entity.second) { - m_log.error("unable to locate ADFS-aware identity provider role for provider (%s)", entityID); + m_log.warn("unable to locate ADFS-aware identity provider role for provider (%s)", entityID); return make_pair(false,0L); } const EndpointType* ep = EndpointManager( dynamic_cast(entity.second)->getSingleSignOnServices() ).getByBinding(m_binding.get()); if (!ep) { - m_log.error("unable to locate compatible SSO service for provider (%s)", entityID); + m_log.warn("unable to locate compatible SSO service for provider (%s)", entityID); return make_pair(false,0L); } diff --git a/shibsp/handler/impl/SAML2SessionInitiator.cpp b/shibsp/handler/impl/SAML2SessionInitiator.cpp index e5ddc7d..97ca7cf 100644 --- a/shibsp/handler/impl/SAML2SessionInitiator.cpp +++ b/shibsp/handler/impl/SAML2SessionInitiator.cpp @@ -481,11 +481,11 @@ pair SAML2SessionInitiator::doRequest( MetadataProvider::Criteria mc(entityID, &IDPSSODescriptor::ELEMENT_QNAME, samlconstants::SAML20P_NS); entity=m->getEntityDescriptor(mc); if (!entity.first) { - m_log.error("unable to locate metadata for provider (%s)", entityID); + m_log.warn("unable to locate metadata for provider (%s)", entityID); throw MetadataException("Unable to locate metadata for identity provider ($entityID)", namedparams(1, "entityID", entityID)); } else if (!entity.second) { - m_log.error("unable to locate SAML 2.0 identity provider role for provider (%s)", entityID); + m_log.warn("unable to locate SAML 2.0 identity provider role for provider (%s)", entityID); return make_pair(false,0L); } @@ -501,7 +501,7 @@ pair SAML2SessionInitiator::doRequest( } } if (!ep || !encoder) { - m_log.error("unable to locate compatible SSO service for provider (%s)", entityID); + m_log.warn("unable to locate compatible SSO service for provider (%s)", entityID); return make_pair(false,0L); } } diff --git a/shibsp/handler/impl/Shib1SessionInitiator.cpp b/shibsp/handler/impl/Shib1SessionInitiator.cpp index 598d294..70b0dda 100644 --- a/shibsp/handler/impl/Shib1SessionInitiator.cpp +++ b/shibsp/handler/impl/Shib1SessionInitiator.cpp @@ -227,18 +227,18 @@ pair Shib1SessionInitiator::doRequest( MetadataProvider::Criteria mc(entityID, &IDPSSODescriptor::ELEMENT_QNAME, shibspconstants::SHIB1_PROTOCOL_ENUM); pair entity = m->getEntityDescriptor(mc); if (!entity.first) { - m_log.error("unable to locate metadata for provider (%s)", entityID); + m_log.warn("unable to locate metadata for provider (%s)", entityID); throw MetadataException("Unable to locate metadata for identity provider ($entityID)", namedparams(1, "entityID", entityID)); } else if (!entity.second) { - m_log.error("unable to locate Shibboleth-aware identity provider role for provider (%s)", entityID); + m_log.warn("unable to locate Shibboleth-aware identity provider role for provider (%s)", entityID); return make_pair(false,0L); } const EndpointType* ep=EndpointManager( dynamic_cast(entity.second)->getSingleSignOnServices() ).getByBinding(shibspconstants::SHIB1_AUTHNREQUEST_PROFILE_URI); if (!ep) { - m_log.error("unable to locate compatible SSO service for provider (%s)", entityID); + m_log.warn("unable to locate compatible SSO service for provider (%s)", entityID); return make_pair(false,0L); } -- 2.1.4