From 1aa740af577b34a615b7f836816789f7696dab0f Mon Sep 17 00:00:00 2001 From: Scott Cantor Date: Thu, 25 Oct 2007 01:03:14 +0000 Subject: [PATCH] Improve logging a bit. --- saml/saml2/metadata/impl/SignatureMetadataFilter.cpp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp b/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp index db93e5b..03147d6 100644 --- a/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp +++ b/saml/saml2/metadata/impl/SignatureMetadataFilter.cpp @@ -165,7 +165,7 @@ void SignatureMetadataFilter::doFilter(EntitiesDescriptor& entities, bool rootOb } catch (exception& e) { auto_ptr_char id(v[i]->getEntityID()); - log.info("filtering out entity (%s) after failed signature check: ", id.get(), e.what()); + log.warn("filtering out entity (%s) after failed signature check: ", id.get(), e.what()); v.erase(v.begin() + i); } } @@ -178,7 +178,7 @@ void SignatureMetadataFilter::doFilter(EntitiesDescriptor& entities, bool rootOb } catch (exception& e) { auto_ptr_char name(w[j]->getName()); - log.info("filtering out group (%s) after failed signature check: ", name.get(), e.what()); + log.warn("filtering out group (%s) after failed signature check: ", name.get(), e.what()); w.erase(w.begin() + j); } } @@ -217,7 +217,7 @@ void SignatureMetadataFilter::verifySignature(Signature* sig, const XMLCh* peerN throw MetadataFilterException("CredentialResolver did not supply a successful verification key."); } else { - throw MetadataFilterException("CredentialResolver did not supply any verification keys."); + throw MetadataFilterException("CredentialResolver did not supply a successful verification key."); } } else if (m_trust) { -- 2.1.4