#ifdef _DEBUG
xmltooling::NDC ndc("init");
#endif
- Category& log=Category::getInstance(SAML_LOGCAT".Config");
+ Category& log=Category::getInstance(SAML_LOGCAT ".Config");
Lock initLock(m_lock);
Lock initLock(m_lock);
if (m_initCount == 0) {
- Category::getInstance(SAML_LOGCAT".Config").crit("term without corresponding init");
+ Category::getInstance(SAML_LOGCAT ".Config").crit("term without corresponding init");
return;
}
else if (--m_initCount > 0) {
if (termXMLTooling)
XMLToolingConfig::getConfig().term();
- Category::getInstance(SAML_LOGCAT".Config").info("%s library shutdown complete", PACKAGE_STRING);
+ Category::getInstance(SAML_LOGCAT ".Config").info("%s library shutdown complete", PACKAGE_STRING);
}
void SAMLInternalConfig::generateRandomBytes(void* buf, unsigned int len)
XMLObject* ArtifactMappings::retrieveContent(const SAMLArtifact* artifact, const char* relyingParty)
{
- Category& log=Category::getInstance(SAML_LOGCAT".ArtifactMap");
+ Category& log=Category::getInstance(SAML_LOGCAT ".ArtifactMap");
Lock wrapper(m_lock);
map<string,Mapping>::iterator i = m_artMap.find(SAMLArtifact::toHex(artifact->getMessageHandle()));
#ifdef _DEBUG
xmltooling::NDC ndc("retrieveContent");
#endif
- Category& log=Category::getInstance(SAML_LOGCAT".ArtifactMap");
+ Category& log=Category::getInstance(SAML_LOGCAT ".ArtifactMap");
if (!m_storage)
return m_mappings->retrieveContent(artifact, relyingParty);
bool ClientCertAuthRule::evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const
{
- Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.ClientCertAuth");
+ Category& log=Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.ClientCertAuth");
if (!request)
return false;
bool MessageFlowRule::evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const
{
- Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.MessageFlow");
+ Category& log=Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.MessageFlow");
log.debug("evaluating message flow policy (replay checking %s, expiration %lu)", m_checkReplay ? "on" : "off", m_expires);
time_t now = policy.getTime();
class SAML_DLLLOCAL NullSecurityRule : public SecurityPolicyRule
{
public:
- NullSecurityRule(const DOMElement* e) : m_log(Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.NullSecurity")) {}
+ NullSecurityRule(const DOMElement* e) : m_log(Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.NullSecurity")) {}
virtual ~NullSecurityRule() {}
const char* getType() const {
bool SimpleSigningRule::evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const
{
- Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.SimpleSigning");
+ Category& log=Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.SimpleSigning");
if (!policy.getIssuerMetadata()) {
log.debug("ignoring message, no issuer metadata supplied");
bool XMLSigningRule::evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const
{
- Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.XMLSigning");
+ Category& log=Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.XMLSigning");
if (!policy.getIssuerMetadata()) {
log.debug("ignoring message, no issuer metadata supplied");
ostringstream os;
os << *ac2;
- Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.AudienceRestriction").error(
+ Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.AudienceRestriction").error(
"unacceptable AudienceRestriction in assertion (%s)", os.str().c_str()
);
throw SecurityPolicyException("Assertion contains an unacceptable AudienceRestriction.");
ostringstream os;
os << *ac1;
- Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.AudienceRestriction").error(
+ Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.AudienceRestriction").error(
"unacceptable AudienceRestrictionCondition in assertion (%s)", os.str().c_str()
);
throw SecurityPolicyException("Assertion contains an unacceptable AudienceRestrictionCondition.");
ConditionsRule::ConditionsRule(const DOMElement* e) : m_doc(nullptr)
{
- Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.Conditions");
+ Category& log=Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.Conditions");
if (!e || !e->hasChildNodes()) {
// Default the configuration.
{
public:
IgnoreRule(const DOMElement* e)
- : m_log(Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.Ignore")), m_qname(XMLHelper::getNodeValueAsQName(e)) {
+ : m_log(Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.Ignore")), m_qname(XMLHelper::getNodeValueAsQName(e)) {
if (!m_qname.get())
throw SecurityPolicyException("No schema type or element name supplied to Ignore rule.");
}
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML1Artifact");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML1Artifact");
log.debug("validating input");
const HTTPRequest* httpRequest=dynamic_cast<const HTTPRequest*>(&genericRequest);
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML1Artifact");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML1Artifact");
log.debug("validating input");
HTTPResponse* httpResponse=dynamic_cast<HTTPResponse*>(&genericResponse);
if (!XMLString::equals(q.getNamespaceURI(), samlconstants::SAML1P_NS))
return;
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML1");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML1");
const Request* request=nullptr;
const Response* response=nullptr;
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML1POST");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML1POST");
log.debug("validating input");
const HTTPRequest* httpRequest=dynamic_cast<const HTTPRequest*>(&genericRequest);
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML1POST");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML1POST");
log.debug("validating input");
TemplateEngine* engine = XMLToolingConfig::getConfig().getTemplateEngine();
{
const xmltooling::QName* code = status.getStatusCode() ? status.getStatusCode()->getValue() : nullptr;
auto_ptr_char str((status.getStatusMessage() ? status.getStatusMessage()->getMessage() : nullptr));
- Category::getInstance(SAML_LOGCAT".SOAPClient").error(
+ Category::getInstance(SAML_LOGCAT ".SOAPClient").error(
"SOAP client detected a SAML error: (%s) (%s)",
(code ? code->toString().c_str() : "no code"),
(str.get() ? str.get() : "no message")
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML1SOAP");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML1SOAP");
log.debug("validating input");
string s = genericRequest.getContentType();
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML1SOAP");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML1SOAP");
log.debug("validating input");
if (xmlObject->getParent())
{
const AudienceRestrictionCondition* ac=dynamic_cast<const AudienceRestrictionCondition*>(c);
if (!ac) {
- Category::getInstance(SAML_LOGCAT".AssertionValidator").error("unrecognized Condition in assertion (%s)",
+ Category::getInstance(SAML_LOGCAT ".AssertionValidator").error("unrecognized Condition in assertion (%s)",
c->getSchemaType() ? c->getSchemaType()->toString().c_str() : c->getElementQName().toString().c_str());
throw ValidationException("Assertion contains an unrecognized condition.");
}
if (!found) {
ostringstream os;
os << *ac;
- Category::getInstance(SAML_LOGCAT".AssertionValidator").error(
+ Category::getInstance(SAML_LOGCAT ".AssertionValidator").error(
"unacceptable AudienceRestrictionCondition in assertion (%s)", os.str().c_str()
);
throw ValidationException("Assertion contains an unacceptable AudienceRestrictionCondition.");
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2Artifact");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2Artifact");
log.debug("validating input");
const HTTPRequest* httpRequest=dynamic_cast<const HTTPRequest*>(&genericRequest);
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML2Artifact");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML2Artifact");
log.debug("validating input");
if (!destination)
throw BindingException("Encoding response requires a destination.");
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2ECP");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2ECP");
log.debug("validating input");
const HTTPRequest* httpRequest = dynamic_cast<const HTTPRequest*>(&genericRequest);
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML2ECP");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML2ECP");
log.debug("validating input");
if (xmlObject->getParent())
if (!XMLString::equals(q.getNamespaceURI(), samlconstants::SAML20P_NS))
return;
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2");
try {
const saml2::RootObject& samlRoot = dynamic_cast<const saml2::RootObject&>(message);
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2POST");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2POST");
log.debug("validating input");
const HTTPRequest* httpRequest=dynamic_cast<const HTTPRequest*>(&genericRequest);
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML2POST");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML2POST");
log.debug("validating input");
TemplateEngine* engine = XMLToolingConfig::getConfig().getTemplateEngine();
#ifdef _DEBUG
xmltooling::NDC ndc("deflate");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2Redirect.zlib");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2Redirect.zlib");
z_stream z;
memset(&z, 0, sizeof(z_stream));
#ifdef _DEBUG
xmltooling::NDC ndc("inflate");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2Redirect.zlib");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2Redirect.zlib");
z_stream z;
memset(&z, 0, sizeof(z_stream));
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2Redirect");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2Redirect");
log.debug("validating input");
const HTTPRequest* httpRequest=dynamic_cast<const HTTPRequest*>(&genericRequest);
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML2Redirect");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML2Redirect");
log.debug("validating input");
HTTPResponse* httpResponse=dynamic_cast<HTTPResponse*>(&genericResponse);
{
auto_ptr_char code((status.getStatusCode() ? status.getStatusCode()->getValue() : nullptr));
auto_ptr_char str((status.getStatusMessage() ? status.getStatusMessage()->getMessage() : nullptr));
- Category::getInstance(SAML_LOGCAT".SOAPClient").error(
+ Category::getInstance(SAML_LOGCAT ".SOAPClient").error(
"SOAP client detected a SAML error: (%s) (%s)",
(code.get() ? code.get() : "no code"),
(str.get() ? str.get() : "no message")
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageDecoder.SAML2SOAP");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageDecoder.SAML2SOAP");
log.debug("validating input");
string s = genericRequest.getContentType();
#ifdef _DEBUG
xmltooling::NDC ndc("encode");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".MessageEncoder.SAML2SOAP");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MessageEncoder.SAML2SOAP");
log.debug("validating input");
if (xmlObject->getParent())
vector<const Credential*> creds;
if (r->first->resolve(creds, r->second) == 0) {
auto_ptr_char name(dynamic_cast<const EntityDescriptor*>(r->second->getRole().getParent())->getEntityID());
- logging::Category::getInstance(SAML_LOGCAT".Encryption").warn("No key encryption credentials found for (%s).", name.get());
+ logging::Category::getInstance(SAML_LOGCAT ".Encryption").warn("No key encryption credentials found for (%s).", name.get());
continue;
}
if (!KEK) {
auto_ptr_char name(dynamic_cast<const EntityDescriptor*>(r->second->getRole().getParent())->getEntityID());
- logging::Category::getInstance(SAML_LOGCAT".Encryption").warn("no supported key encryption credential found for (%s).", name.get());
+ logging::Category::getInstance(SAML_LOGCAT ".Encryption").warn("no supported key encryption credential found for (%s).", name.get());
continue;
}
return i->second;
if (range.first != range.second) {
- Category& log = Category::getInstance(SAML_LOGCAT".MetadataProvider");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MetadataProvider");
if (strict) {
log.warn("ignored expired metadata group (%s)", range.first->first.c_str());
}
}
if (!result.first && range.first!=range.second) {
- Category& log = Category::getInstance(SAML_LOGCAT".MetadataProvider");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MetadataProvider");
if (criteria.validOnly) {
log.warn("ignored expired metadata instance for (%s)", range.first->first.c_str());
}
EntitiesDescriptor* group = dynamic_cast<EntitiesDescriptor*>(&xmlObject);
if (group) {
if (group->getName() && !m_entities.empty() && m_entities.count(group->getName()) > 0)
- throw MetadataFilterException(BLACKLIST_METADATA_FILTER" MetadataFilter instructed to filter the root group in the metadata.");
+ throw MetadataFilterException(BLACKLIST_METADATA_FILTER " MetadataFilter instructed to filter the root group in the metadata.");
filterGroup(group);
}
else {
EntityDescriptor* entity = dynamic_cast<EntityDescriptor*>(&xmlObject);
if (entity) {
if (included(*entity))
- throw MetadataFilterException(BLACKLIST_METADATA_FILTER" MetadataFilter instructed to filter the root/only entity in the metadata.");
+ throw MetadataFilterException(BLACKLIST_METADATA_FILTER " MetadataFilter instructed to filter the root/only entity in the metadata.");
}
else {
- throw MetadataFilterException(BLACKLIST_METADATA_FILTER" MetadataFilter was given an improper metadata instance to filter.");
+ throw MetadataFilterException(BLACKLIST_METADATA_FILTER " MetadataFilter was given an improper metadata instance to filter.");
}
}
}
void BlacklistMetadataFilter::filterGroup(EntitiesDescriptor* entities) const
{
- Category& log = Category::getInstance(SAML_LOGCAT".MetadataFilter."WHITELIST_METADATA_FILTER);
+ Category& log = Category::getInstance(SAML_LOGCAT ".MetadataFilter." WHITELIST_METADATA_FILTER);
VectorOf(EntityDescriptor) v = entities->getEntityDescriptors();
for (VectorOf(EntityDescriptor)::size_type i = 0; i < v.size(); ) {
static const XMLCh _MetadataProvider[] = UNICODE_LITERAL_16(M,e,t,a,d,a,t,a,P,r,o,v,i,d,e,r);
static const XMLCh precedence[] = UNICODE_LITERAL_10(p,r,e,c,e,d,e,n,c,e);
static const XMLCh last[] = UNICODE_LITERAL_4(l,a,s,t);
- static const XMLCh _type[] = UNICODE_LITERAL_4(t,y,p,e);
+ static const XMLCh _type[] = UNICODE_LITERAL_4(t,y,p,e);
};
};
ChainingMetadataProvider::ChainingMetadataProvider(const DOMElement* e)
: ObservableMetadataProvider(e), m_firstMatch(true), m_trackerLock(Mutex::create()), m_tlsKey(ThreadKey::create(tracker_cleanup)),
- m_log(Category::getInstance(SAML_LOGCAT".Metadata.Chaining"))
+ m_log(Category::getInstance(SAML_LOGCAT ".Metadata.Chaining"))
{
if (XMLString::equals(e ? e->getAttributeNS(nullptr, precedence) : nullptr, last))
m_firstMatch = false;
m_discoFilters.push_back(make_pair(t == "Whitelist", temp));
}
catch (std::exception& ex) {
- Category::getInstance(SAML_LOGCAT".MetadataProvider.Discoverable").error(
+ Category::getInstance(SAML_LOGCAT ".MetadataProvider.Discoverable").error(
"exception creating <DiscoveryFilter> EntityMatcher: %s", ex.what()
);
}
}
else {
- Category::getInstance(SAML_LOGCAT".MetadataProvider.Discoverable").error("<DiscoveryFilter> requires matcher attribute");
+ Category::getInstance(SAML_LOGCAT ".MetadataProvider.Discoverable").error("<DiscoveryFilter> requires matcher attribute");
}
}
else {
- Category::getInstance(SAML_LOGCAT".MetadataProvider.Discoverable").error(
+ Category::getInstance(SAML_LOGCAT ".MetadataProvider.Discoverable").error(
"unknown <DiscoveryFilter> type (%s)", t.empty() ? "none" : t.c_str()
);
}
m_maxCacheDuration(XMLHelper::getAttrInt(e, 28800, maxCacheDuration))
{
if (m_minCacheDuration > m_maxCacheDuration) {
- Category::getInstance(SAML_LOGCAT".MetadataProvider.Dynamic").error(
+ Category::getInstance(SAML_LOGCAT ".MetadataProvider.Dynamic").error(
"minCacheDuration setting exceeds maxCacheDuration setting, lowering to match it"
);
m_minCacheDuration = m_maxCacheDuration;
auto_ptr_char temp(delay);
m_refreshDelayFactor = atof(temp.get());
if (m_refreshDelayFactor <= 0.0 || m_refreshDelayFactor >= 1.0) {
- Category::getInstance(SAML_LOGCAT".MetadataProvider.Dynamic").error(
+ Category::getInstance(SAML_LOGCAT ".MetadataProvider.Dynamic").error(
"invalid refreshDelayFactor setting, using default"
);
m_refreshDelayFactor = 0.75;
pair<const EntityDescriptor*,const RoleDescriptor*> DynamicMetadataProvider::getEntityDescriptor(const Criteria& criteria) const
{
- Category& log = Category::getInstance(SAML_LOGCAT".MetadataProvider.Dynamic");
+ Category& log = Category::getInstance(SAML_LOGCAT ".MetadataProvider.Dynamic");
// First we check the underlying cache.
pair<const EntityDescriptor*,const RoleDescriptor*> entity = AbstractMetadataProvider::getEntityDescriptor(criteria);
}
catch (XMLException& e) {
auto_ptr_char msg(e.getMessage());
- Category::getInstance(SAML_LOGCAT".MetadataProvider.Dynamic").error(
+ Category::getInstance(SAML_LOGCAT ".MetadataProvider.Dynamic").error(
"Xerces error while resolving entityID (%s): %s", name.c_str(), msg.get()
);
throw MetadataException(msg.get());
EntityAttributesEntityMatcher::EntityAttributesEntityMatcher(const DOMElement* e)
: m_trimTags(XMLHelper::getAttrBool(e, false, trimTags)),
- m_log(Category::getInstance(SAML_LOGCAT".EntityMatcher.EntityAttributes"))
+ m_log(Category::getInstance(SAML_LOGCAT ".EntityMatcher.EntityAttributes"))
{
// Check for shorthand syntax.
if (e && e->hasAttributeNS(nullptr, attributeName) && (e->hasAttributeNS(nullptr, attributeValue) || e->hasAttributeNS(nullptr, attributeValueRegex))) {
filterEntity(entity);
}
else {
- throw MetadataFilterException(ENTITYATTR_METADATA_FILTER" MetadataFilter was given an improper metadata instance to filter.");
+ throw MetadataFilterException(ENTITYATTR_METADATA_FILTER " MetadataFilter was given an improper metadata instance to filter.");
}
}
}
doFilter(*entity);
}
else {
- throw MetadataFilterException(ENTITYROLE_METADATA_FILTER" MetadataFilter was given an improper metadata instance to filter.");
+ throw MetadataFilterException(ENTITYROLE_METADATA_FILTER " MetadataFilter was given an improper metadata instance to filter.");
}
}
}
void EntityRoleMetadataFilter::doFilter(EntitiesDescriptor& entities) const
{
- Category& log=Category::getInstance(SAML_LOGCAT".MetadataFilter."ENTITYROLE_METADATA_FILTER);
+ Category& log=Category::getInstance(SAML_LOGCAT ".MetadataFilter." ENTITYROLE_METADATA_FILTER);
VectorOf(EntityDescriptor) v = entities.getEntityDescriptors();
for (VectorOf(EntityDescriptor)::size_type i = 0; i < v.size(); ) {
if (e->hasAttributeNS(nullptr, precedence))
root->setAttributeNS(nullptr, precedence, e->getAttributeNS(nullptr, precedence));
- Category& log = Category::getInstance(SAML_LOGCAT".Metadata.Folder");
+ Category& log = Category::getInstance(SAML_LOGCAT ".Metadata.Folder");
log.info("loading metadata files from folder (%s)", loc.c_str());
#ifdef WIN32
#ifdef _DEBUG
NDC ndc("MetadataProvider");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".Metadata");
+ Category& log = Category::getInstance(SAML_LOGCAT ".Metadata");
SAMLConfig& conf = SAMLConfig::getConfig();
// Locate any default recognized filters and plugins.
void MetadataProvider::doFilters(XMLObject& xmlObject) const
{
- Category& log = Category::getInstance(SAML_LOGCAT".Metadata");
+ Category& log = Category::getInstance(SAML_LOGCAT ".Metadata");
for (ptr_vector<MetadataFilter>::const_iterator i = m_filters.begin(); i != m_filters.end(); i++) {
log.info("applying metadata filter (%s)", i->getId());
i->doFilter(m_filterContext, xmlObject);
SignatureMetadataFilter::SignatureMetadataFilter(const DOMElement* e)
: m_verifyRoles(XMLHelper::getAttrBool(e, false, verifyRoles)),
m_verifyName(XMLHelper::getAttrBool(e, true, verifyName)),
- m_log(Category::getInstance(SAML_LOGCAT".MetadataFilter.Signature"))
+ m_log(Category::getInstance(SAML_LOGCAT ".MetadataFilter.Signature"))
{
if (e && e->hasAttributeNS(nullptr,certificate)) {
// Use a file-based credential resolver rooted here.
EntityDescriptor* entity = dynamic_cast<EntityDescriptor*>(&xmlObject);
if (entity) {
if (!included(*entity))
- throw MetadataFilterException(WHITELIST_METADATA_FILTER" MetadataFilter instructed to filter the root/only entity in the metadata.");
+ throw MetadataFilterException(WHITELIST_METADATA_FILTER " MetadataFilter instructed to filter the root/only entity in the metadata.");
}
else {
- throw MetadataFilterException(WHITELIST_METADATA_FILTER" MetadataFilter was given an improper metadata instance to filter.");
+ throw MetadataFilterException(WHITELIST_METADATA_FILTER " MetadataFilter was given an improper metadata instance to filter.");
}
}
}
void WhitelistMetadataFilter::filterGroup(EntitiesDescriptor* entities) const
{
- Category& log = Category::getInstance(SAML_LOGCAT".MetadataFilter."WHITELIST_METADATA_FILTER);
+ Category& log = Category::getInstance(SAML_LOGCAT ".MetadataFilter." WHITELIST_METADATA_FILTER);
VectorOf(EntityDescriptor) v = entities->getEntityDescriptors();
for (VectorOf(EntityDescriptor)::size_type i = 0; i < v.size(); ) {
XMLMetadataProvider::XMLMetadataProvider(const DOMElement* e)
: MetadataProvider(e), AbstractMetadataProvider(e), DiscoverableMetadataProvider(e),
- ReloadableXMLFile(e, Category::getInstance(SAML_LOGCAT".MetadataProvider.XML"), false),
+ ReloadableXMLFile(e, Category::getInstance(SAML_LOGCAT ".MetadataProvider.XML"), false),
m_discoveryFeed(XMLHelper::getAttrBool(e, true, discoveryFeed)),
m_dropDOM(XMLHelper::getAttrBool(e, true, dropDOM)),
m_refreshDelayFactor(0.75), m_backoffFactor(1),
{
const AudienceRestriction* ac=dynamic_cast<const AudienceRestriction*>(c);
if (!ac) {
- Category::getInstance(SAML_LOGCAT".AssertionValidator").error("unrecognized Condition in assertion (%s)",
+ Category::getInstance(SAML_LOGCAT ".AssertionValidator").error("unrecognized Condition in assertion (%s)",
c->getSchemaType() ? c->getSchemaType()->toString().c_str() : c->getElementQName().toString().c_str());
throw ValidationException("Assertion contains an unrecognized condition.");
}
if (!found) {
ostringstream os;
os << *ac;
- Category::getInstance(SAML_LOGCAT".AssertionValidator").error("unacceptable AudienceRestriction in assertion (%s)", os.str().c_str());
+ Category::getInstance(SAML_LOGCAT ".AssertionValidator").error("unacceptable AudienceRestriction in assertion (%s)", os.str().c_str());
throw ValidationException("Assertion contains an unacceptable AudienceRestriction.");
}
}
if (!a)
return false;
- logging::Category& log = logging::Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.BearerConfirmation");
+ logging::Category& log = logging::Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.BearerConfirmation");
const char* msg="assertion is missing bearer SubjectConfirmation";
const Subject* subject = a->getSubject();
#ifdef _DEBUG
xmltooling::NDC ndc("validate");
#endif
- Category& log = Category::getInstance(SAML_LOGCAT".AssertionValidator");
+ Category& log = Category::getInstance(SAML_LOGCAT ".AssertionValidator");
// The assertion MUST have proper confirmation requirements.
const char* msg="assertion is missing bearer SubjectConfirmation";
// d1 is the input from the message, d2 is from the policy
bool operator()(const Delegate* d1, const Delegate& d2) const {
if (!d1->getNameID()) {
- Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.DelegationRestriction").error(
+ Category::getInstance(SAML_LOGCAT ".SecurityPolicyRule.DelegationRestriction").error(
"rule doesn't support evaluation of BaseID or EncryptedID in a Delegate"
);
return false;
throw ValidationException("Signature is not a child of a signable SAML object.");
if (sig->getObjectLength() != 0) {
- Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an embedded <Object> element");
+ Category::getInstance(SAML_LOGCAT ".SignatureProfileValidator").error("signature contained an embedded <Object> element");
throw ValidationException("Invalid signature profile for SAML object.");
}
else if (tlist->item(i)->getTransformType()!=TRANSFORM_EXC_C14N &&
tlist->item(i)->getTransformType()!=TRANSFORM_C14N) {
valid=false;
- Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained an invalid transform");
+ Category::getInstance(SAML_LOGCAT ".SignatureProfileValidator").error("signature contained an invalid transform");
break;
}
}
valid = true;
}
else {
- Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object node");
+ Category::getInstance(SAML_LOGCAT ".SignatureProfileValidator").error("signature reference does not match parent object node");
}
}
}
}
else {
- Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature reference does not match parent object ID");
+ Category::getInstance(SAML_LOGCAT ".SignatureProfileValidator").error("signature reference does not match parent object ID");
}
}
}
else {
- Category::getInstance(SAML_LOGCAT".SignatureProfileValidator").error("signature contained multiple or zero references");
+ Category::getInstance(SAML_LOGCAT ".SignatureProfileValidator").error("signature contained multiple or zero references");
}
if (!valid)