projects
/
shibboleth
/
cpp-opensaml.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
|
inline
| side by side (parent:
e93a1bc
)
Improve logging a bit.
author
Scott Cantor
<cantor.2@osu.edu>
Thu, 25 Oct 2007 01:03:14 +0000
(
01:03
+0000)
committer
Scott Cantor
<cantor.2@osu.edu>
Thu, 25 Oct 2007 01:03:14 +0000
(
01:03
+0000)
saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
patch
|
blob
|
history
diff --git
a/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
b/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
index
db93e5b
..
03147d6
100644
(file)
--- a/
saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
+++ b/
saml/saml2/metadata/impl/SignatureMetadataFilter.cpp
@@
-165,7
+165,7
@@
void SignatureMetadataFilter::doFilter(EntitiesDescriptor& entities, bool rootOb
}
catch (exception& e) {
auto_ptr_char id(v[i]->getEntityID());
}
catch (exception& e) {
auto_ptr_char id(v[i]->getEntityID());
- log.
info
("filtering out entity (%s) after failed signature check: ", id.get(), e.what());
+ log.
warn
("filtering out entity (%s) after failed signature check: ", id.get(), e.what());
v.erase(v.begin() + i);
}
}
v.erase(v.begin() + i);
}
}
@@
-178,7
+178,7
@@
void SignatureMetadataFilter::doFilter(EntitiesDescriptor& entities, bool rootOb
}
catch (exception& e) {
auto_ptr_char name(w[j]->getName());
}
catch (exception& e) {
auto_ptr_char name(w[j]->getName());
- log.
info
("filtering out group (%s) after failed signature check: ", name.get(), e.what());
+ log.
warn
("filtering out group (%s) after failed signature check: ", name.get(), e.what());
w.erase(w.begin() + j);
}
}
w.erase(w.begin() + j);
}
}
@@
-217,7
+217,7
@@
void SignatureMetadataFilter::verifySignature(Signature* sig, const XMLCh* peerN
throw MetadataFilterException("CredentialResolver did not supply a successful verification key.");
}
else {
throw MetadataFilterException("CredentialResolver did not supply a successful verification key.");
}
else {
- throw MetadataFilterException("CredentialResolver did not supply a
ny verification keys
.");
+ throw MetadataFilterException("CredentialResolver did not supply a
successful verification key
.");
}
}
else if (m_trust) {
}
}
else if (m_trust) {