projects
/
shibboleth
/
cpp-opensaml.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Improve logging a bit.
[shibboleth/cpp-opensaml.git]
/
saml
/
saml2
/
metadata
/
impl
/
SignatureMetadataFilter.cpp
diff --git
a/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
b/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
index
db93e5b
..
03147d6
100644
(file)
--- a/
saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
+++ b/
saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
@@
-165,7
+165,7
@@
void SignatureMetadataFilter::doFilter(EntitiesDescriptor& entities, bool rootOb
}
catch (exception& e) {
auto_ptr_char id(v[i]->getEntityID());
}
catch (exception& e) {
auto_ptr_char id(v[i]->getEntityID());
- log.
info
("filtering out entity (%s) after failed signature check: ", id.get(), e.what());
+ log.
warn
("filtering out entity (%s) after failed signature check: ", id.get(), e.what());
v.erase(v.begin() + i);
}
}
v.erase(v.begin() + i);
}
}
@@
-178,7
+178,7
@@
void SignatureMetadataFilter::doFilter(EntitiesDescriptor& entities, bool rootOb
}
catch (exception& e) {
auto_ptr_char name(w[j]->getName());
}
catch (exception& e) {
auto_ptr_char name(w[j]->getName());
- log.
info
("filtering out group (%s) after failed signature check: ", name.get(), e.what());
+ log.
warn
("filtering out group (%s) after failed signature check: ", name.get(), e.what());
w.erase(w.begin() + j);
}
}
w.erase(w.begin() + j);
}
}
@@
-217,7
+217,7
@@
void SignatureMetadataFilter::verifySignature(Signature* sig, const XMLCh* peerN
throw MetadataFilterException("CredentialResolver did not supply a successful verification key.");
}
else {
throw MetadataFilterException("CredentialResolver did not supply a successful verification key.");
}
else {
- throw MetadataFilterException("CredentialResolver did not supply a
ny verification keys
.");
+ throw MetadataFilterException("CredentialResolver did not supply a
successful verification key
.");
}
}
else if (m_trust) {
}
}
else if (m_trust) {