{
public:
ADFSSessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.ADFS"), nullptr, &m_remapper), m_appId(appId), m_binding(WSFED_NS) {
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.ADFS"), nullptr, &m_remapper), m_appId(appId), m_binding(WSFED_NS) {
// If Location isn't set, defer address registration until the setParent call.
pair<bool,const char*> loc = getString("Location");
if (loc.first) {
auto_ptr_XMLCh m_protocol;
public:
ADFSConsumer(const DOMElement* e, const char* appId)
- : shibsp::AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT".SSO.ADFS")), m_protocol(WSFED_NS) {}
+ : shibsp::AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT ".SSO.ADFS")), m_protocol(WSFED_NS) {}
virtual ~ADFSConsumer() {}
#ifndef SHIBSP_LITE
{
public:
ADFSLogoutInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".LogoutInitiator.ADFS")), m_appId(appId), m_binding(WSFED_NS) {
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".LogoutInitiator.ADFS")), m_appId(appId), m_binding(WSFED_NS) {
// If Location isn't set, defer address registration until the setParent call.
pair<bool,const char*> loc = getString("Location");
if (loc.first) {
{
public:
ADFSLogout(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".Logout.ADFS")), m_login(e, appId) {
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".Logout.ADFS")), m_login(e, appId) {
m_initiator = false;
#ifndef SHIBSP_LITE
m_preserve.push_back("wreply");
#ifdef _DEBUG
xmltooling::NDC ndc("decode");
#endif
- Category& log = Category::getInstance(SHIBSP_LOGCAT".MessageDecoder.ADFS");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".MessageDecoder.ADFS");
log.debug("validating input");
const HTTPRequest* httpRequest=dynamic_cast<const HTTPRequest*>(&genericRequest);
shib_server_config* m_sc;
shib_request_config* m_rc;
- ShibTargetApache(request_rec* req) : AbstractSPRequest(SHIBSP_LOGCAT".Apache"),
+ ShibTargetApache(request_rec* req) : AbstractSPRequest(SHIBSP_LOGCAT ".Apache"),
m_gotBody(false),m_firsttime(true),
#if defined(SHIBSP_HAVE_GSSAPI) && !defined(SHIB_APACHE_13)
m_gssname(GSS_C_NO_NAME),
map<string,string> m_request_headers;
ShibTargetFCGIAuth(FCGX_Request* req, const char* scheme=nullptr, const char* hostname=nullptr, int port=0)
- : AbstractSPRequest(SHIBSP_LOGCAT".FastCGI"), m_req(req) {
+ : AbstractSPRequest(SHIBSP_LOGCAT ".FastCGI"), m_req(req) {
const char* server_name_str = hostname;
if (!server_name_str || !*server_name_str)
server_name_str = FCGX_GetParam("SERVER_NAME", req->envp);
public:
ShibTargetFCGI(FCGX_Request* req, char* post_data, const char* scheme=nullptr, const char* hostname=nullptr, int port=0)
- : AbstractSPRequest(SHIBSP_LOGCAT".FastCGI"), m_req(req), m_body(post_data) {
+ : AbstractSPRequest(SHIBSP_LOGCAT ".FastCGI"), m_req(req), m_body(post_data) {
const char* server_name_str = hostname;
if (!server_name_str || !*server_name_str)
public:
ShibTargetIsapiF(PHTTP_FILTER_CONTEXT pfc, PHTTP_FILTER_PREPROC_HEADERS pn, const site_t& site)
- : AbstractSPRequest(SHIBSP_LOGCAT".ISAPI"), m_pfc(pfc), m_pn(pn), m_allhttp(4096), m_firsttime(true) {
+ : AbstractSPRequest(SHIBSP_LOGCAT ".ISAPI"), m_pfc(pfc), m_pn(pn), m_allhttp(4096), m_firsttime(true) {
// URL path always come from IIS.
dynabuf var(256);
public:
ShibTargetIsapiE(LPEXTENSION_CONTROL_BLOCK lpECB, const site_t& site)
- : AbstractSPRequest(SHIBSP_LOGCAT".ISAPI"), m_lpECB(lpECB), m_gotBody(false) {
+ : AbstractSPRequest(SHIBSP_LOGCAT ".ISAPI"), m_lpECB(lpECB), m_gotBody(false) {
dynabuf ssl(5);
GetServerVariable("HTTPS",ssl,5);
bool SSL=(ssl=="on" || ssl=="ON");
Request* m_rq;
ShibTargetNSAPI(pblock* pb, ::Session* sn, Request* rq)
- : AbstractSPRequest(SHIBSP_LOGCAT".NSAPI"),
+ : AbstractSPRequest(SHIBSP_LOGCAT ".NSAPI"),
m_gotBody(false), m_firsttime(true), m_security_active(false), m_server_portnum(0), m_pb(pb), m_sn(sn), m_rq(rq) {
// To determine whether SSL is active or not, we're supposed to rely
vector<opensaml::Assertion*> FoldingContext::m_assertions;
CaseFoldingAttributeResolver::CaseFoldingAttributeResolver(const DOMElement* e, case_t direction)
- : m_log(Category::getInstance(SHIBSP_LOGCAT".AttributeResolver.CaseFolding")),
+ : m_log(Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver.CaseFolding")),
m_direction(direction),
m_source(XMLHelper::getAttrString(e, nullptr, source)),
m_dest(1, XMLHelper::getAttrString(e, nullptr, dest))
{
public:
GSSAPIExtractor(const DOMElement* e)
- : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT".AttributeExtractor.GSSAPI")) {
+ : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT ".AttributeExtractor.GSSAPI")) {
background_load();
}
~GSSAPIExtractor() {
vector<opensaml::Assertion*> TemplateContext::m_assertions;
TemplateAttributeResolver::TemplateAttributeResolver(const DOMElement* e)
- : m_log(Category::getInstance(SHIBSP_LOGCAT".AttributeResolver.Template")),
+ : m_log(Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver.Template")),
m_dest(1, XMLHelper::getAttrString(e, nullptr, dest))
{
if (m_dest.front().empty())
vector<opensaml::Assertion*> TransformContext::m_assertions;
TransformAttributeResolver::TransformAttributeResolver(const DOMElement* e)
- : m_log(Category::getInstance(SHIBSP_LOGCAT".AttributeResolver.Transform")),
+ : m_log(Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver.Transform")),
m_source(XMLHelper::getAttrString(e, nullptr, source))
{
if (m_source.empty())
std::string lc(logconf);
XMLToolingConfig::getConfig().log_config(localpr.resolve(lc, PathResolver::XMLTOOLING_CFG_FILE, PACKAGE_NAME).c_str());
- Category& log=Category::getInstance(SHIBSP_LOGCAT".Config");
+ Category& log=Category::getInstance(SHIBSP_LOGCAT ".Config");
log.debug("%s library initialization started", PACKAGE_STRING);
#ifndef SHIBSP_LITE
void SPConfig::term()
{
- Category& log=Category::getInstance(SHIBSP_LOGCAT".Config");
+ Category& log=Category::getInstance(SHIBSP_LOGCAT ".Config");
log.info("%s library shutting down", PACKAGE_STRING);
setServiceProvider(nullptr);
catch (exception& ex) {
if (rethrow)
throw;
- Category::getInstance(SHIBSP_LOGCAT".Config").fatal("caught exception while loading configuration: %s", ex.what());
+ Category::getInstance(SHIBSP_LOGCAT ".Config").fatal("caught exception while loading configuration: %s", ex.what());
}
return false;
}
Lock initLock(m_lock);
if (m_initCount == INT_MAX) {
- Category::getInstance(SHIBSP_LOGCAT".Config").crit("library initialized too many times");
+ Category::getInstance(SHIBSP_LOGCAT ".Config").crit("library initialized too many times");
return false;
}
Lock initLock(m_lock);
if (m_initCount == 0) {
- Category::getInstance(SHIBSP_LOGCAT".Config").crit("term without corresponding init");
+ Category::getInstance(SHIBSP_LOGCAT ".Config").crit("term without corresponding init");
return;
}
else if (--m_initCount > 0) {
if (i != m_listenerMap.end())
ret = i->second;
m_listenerMap[address] = listener;
- Category::getInstance(SHIBSP_LOGCAT".ServiceProvider").info("registered remoted message endpoint (%s)",address);
+ Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider").info("registered remoted message endpoint (%s)",address);
return ret;
}
m_listenerMap[address] = restore;
else
m_listenerMap.erase(address);
- Category::getInstance(SHIBSP_LOGCAT".ServiceProvider").info("unregistered remoted message endpoint (%s)",address);
+ Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider").info("unregistered remoted message endpoint (%s)",address);
return true;
}
return false;
#ifdef _DEBUG
xmltooling::NDC ndc("doAuthentication");
#endif
- Category& log = Category::getInstance(SHIBSP_LOGCAT".ServiceProvider");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider");
const Application* app = nullptr;
string targetURL = request.getRequestURL();
#ifdef _DEBUG
xmltooling::NDC ndc("doAuthorization");
#endif
- Category& log = Category::getInstance(SHIBSP_LOGCAT".ServiceProvider");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider");
const Application* app = nullptr;
Session* session = nullptr;
#ifdef _DEBUG
xmltooling::NDC ndc("doExport");
#endif
- Category& log = Category::getInstance(SHIBSP_LOGCAT".ServiceProvider");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider");
const Application* app = nullptr;
Session* session = nullptr;
#ifdef _DEBUG
xmltooling::NDC ndc("doHandler");
#endif
- Category& log = Category::getInstance(SHIBSP_LOGCAT".ServiceProvider");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider");
const Application* app = nullptr;
string targetURL = request.getRequestURL();
vector<string>& dest = simple->getValues();
pair<vector<XMLObject*>::const_iterator,vector<XMLObject*>::const_iterator> valrange;
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.Base64");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.Base64");
if (xmlObject && XMLString::equals(opensaml::saml1::Attribute::LOCAL_NAME,xmlObject->getElementQName().getLocalPart())) {
const opensaml::saml2::Attribute* saml2attr = dynamic_cast<const opensaml::saml2::Attribute*>(xmlObject);
DOMAttributeDecoder::DOMAttributeDecoder(const DOMElement* e)
: AttributeDecoder(e), m_formatter(XMLHelper::getAttrString(e, nullptr, formatter))
{
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.DOM");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.DOM");
e = XMLHelper::getFirstChildElement(e, Mapping);
while (e) {
const GenericRequest* request, const vector<string>& ids, const XMLObject* xmlObject, const char* assertingParty, const char* relyingParty
) const
{
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.DOM");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.DOM");
if (!xmlObject)
return nullptr;
const GenericRequest*, const vector<string>& ids, const XMLObject* xmlObject, const char* assertingParty, const char* relyingParty
) const
{
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.KeyInfo");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.KeyInfo");
if (!xmlObject || !XMLString::equals(saml1::Attribute::LOCAL_NAME, xmlObject->getElementQName().getLocalPart())) {
log.warn("XMLObject type not recognized by KeyInfoAttributeDecoder, no values returned");
m_serialized.push_back(out.string());
}
catch (exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".Attribute.NameID").error("exception remoting hash operation: %s", ex.what());
+ Category::getInstance(SHIBSP_LOGCAT ".Attribute.NameID").error("exception remoting hash operation: %s", ex.what());
}
#endif
}
vector<NameIDAttribute::Value>& dest = nameid->getValues();
vector<XMLObject*>::const_iterator v,stop;
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.NameID");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.NameID");
if (xmlObject && XMLString::equals(opensaml::saml1::Attribute::LOCAL_NAME,xmlObject->getElementQName().getLocalPart())) {
const opensaml::saml2::Attribute* saml2attr = dynamic_cast<const opensaml::saml2::Attribute*>(xmlObject);
vector<NameIDAttribute::Value>& dest = nameid->getValues();
pair<vector<XMLObject*>::const_iterator,vector<XMLObject*>::const_iterator> valrange;
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.NameIDFromScoped");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.NameIDFromScoped");
if (xmlObject && XMLString::equals(opensaml::saml1::Attribute::LOCAL_NAME,xmlObject->getElementQName().getLocalPart())) {
const opensaml::saml2::Attribute* saml2attr = dynamic_cast<const opensaml::saml2::Attribute*>(xmlObject);
vector< pair<string,string> >& dest = scoped->getValues();
pair<vector<XMLObject*>::const_iterator,vector<XMLObject*>::const_iterator> valrange;
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.Scoped");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.Scoped");
if (xmlObject && XMLString::equals(opensaml::saml1::Attribute::LOCAL_NAME,xmlObject->getElementQName().getLocalPart())) {
const opensaml::saml2::Attribute* saml2attr = dynamic_cast<const opensaml::saml2::Attribute*>(xmlObject);
vector<string>& dest = simple->getValues();
pair<vector<XMLObject*>::const_iterator,vector<XMLObject*>::const_iterator> valrange;
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.String");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.String");
if (xmlObject && XMLString::equals(opensaml::saml1::Attribute::LOCAL_NAME,xmlObject->getElementQName().getLocalPart())) {
const opensaml::saml2::Attribute* saml2attr = dynamic_cast<const opensaml::saml2::Attribute*>(xmlObject);
if (!xmlObject)
return nullptr;
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeDecoder.XML");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeDecoder.XML");
auto_ptr<XMLAttribute> attr(new XMLAttribute(ids));
vector<string>& dest = attr->getValues();
throw ConfigurationException("AttributeValueString MatchFunctor requires non-empty value attribute.");
}
if (e && e->hasAttributeNS(nullptr, ignoreCase)) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"ignoreCase property ignored by AttributeValueString MatchFunctor in favor of attribute's caseSensitive property"
);
}
while (e) {
string t(XMLHelper::getAttrString(e, nullptr, _type));
if (!t.empty()) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter.Chaining").info("building AttributeFilter of type (%s)...", t.c_str());
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter.Chaining").info("building AttributeFilter of type (%s)...", t.c_str());
auto_ptr<AttributeFilter> np(SPConfig::getConfig().AttributeFilterManager.newPlugin(t.c_str(), e));
m_filters.push_back(np.get());
np.release();
}
void filterAttributes(const FilteringContext& context, vector<Attribute*>& attributes) const {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter.Dummy").warn("filtering out all attributes");
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter.Dummy").warn("filtering out all attributes");
for_each(attributes.begin(), attributes.end(), xmltooling::cleanup<Attribute>());
attributes.clear();
}
{
const NameIDAttribute* nameattr = dynamic_cast<const NameIDAttribute*>(&attribute);
if (!nameattr) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"NameIDQualifierString MatchFunctor applied to non-NameID-valued attribute (%s)", attribute.getId()
);
return false;
auto_ptr_char issuer(filterContext.getAttributeIssuer());
if (issuer.get() && *issuer.get()) {
if (val.m_NameQualifier != issuer.get()) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"NameIDQualifierString MatchFunctor rejecting NameQualifier (%s), should be (%s)",
val.m_NameQualifier.c_str(), issuer.get()
);
}
}
else {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"NameIDQualifierString MatchFunctor rejecting NameQualifier (%s), attribute issuer unknown",
val.m_NameQualifier.c_str()
);
}
}
else if (m_matchNameQualifier != val.m_NameQualifier) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"NameIDQualifierString MatchFunctor rejecting NameQualifier (%s), should be (%s)",
val.m_NameQualifier.c_str(), m_matchNameQualifier.c_str()
);
auto_ptr_char req(filterContext.getAttributeRequester());
if (req.get() && *req.get()) {
if (val.m_SPNameQualifier != req.get()) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"NameIDQualifierString MatchFunctor rejecting SPNameQualifier (%s), should be (%s)",
val.m_SPNameQualifier.c_str(), req.get()
);
}
}
else {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"NameIDQualifierString MatchFunctor rejecting SPNameQualifier (%s), attribute requester unknown",
val.m_SPNameQualifier.c_str()
);
}
}
else if (m_matchSPNameQualifier != val.m_SPNameQualifier) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeFilter").warn(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter").warn(
"NameIDQualifierString MatchFunctor rejecting SPNameQualifier (%s), should be (%s)",
val.m_SPNameQualifier.c_str(), m_matchSPNameQualifier.c_str()
);
class SHIBSP_DLLLOCAL XMLFilter : public AttributeFilter, public ReloadableXMLFile
{
public:
- XMLFilter(const DOMElement* e) : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT".AttributeFilter")) {
+ XMLFilter(const DOMElement* e) : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT ".AttributeFilter")) {
background_load();
}
~XMLFilter() {
string t(XMLHelper::getAttrString(e, nullptr, _type));
if (!t.empty()) {
try {
- Category::getInstance(SHIBSP_LOGCAT".AttributeExtractor.Chaining").info(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeExtractor.Chaining").info(
"building AttributeExtractor of type (%s)...", t.c_str()
);
auto_ptr<AttributeExtractor> np(conf.AttributeExtractorManager.newPlugin(t.c_str(), e));
np.release();
}
catch (exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeExtractor.Chaining").error(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeExtractor.Chaining").error(
"caught exception processing embedded AttributeExtractor element: %s", ex.what()
);
}
string t(XMLHelper::getAttrString(e, nullptr, _type));
if (!t.empty()) {
try {
- Category::getInstance(SHIBSP_LOGCAT".AttributeResolver."CHAINING_ATTRIBUTE_RESOLVER).info(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver."CHAINING_ATTRIBUTE_RESOLVER).info(
"building AttributeResolver of type (%s)...", t.c_str()
);
auto_ptr<AttributeResolver> np(conf.AttributeResolverManager.newPlugin(t.c_str(), e));
np.release();
}
catch (exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeResolver."CHAINING_ATTRIBUTE_RESOLVER).error(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver."CHAINING_ATTRIBUTE_RESOLVER).error(
"caught exception processing embedded AttributeResolver element: %s", ex.what()
);
}
context->getResolvedAssertions().clear();
}
catch (exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".AttributeResolver."CHAINING_ATTRIBUTE_RESOLVER).error(
+ Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver."CHAINING_ATTRIBUTE_RESOLVER).error(
"caught exception applying AttributeResolver in chain: %s", ex.what()
);
}
if (!assertion || !assertion->getConditions())
return;
- Category& log = Category::getInstance(SHIBSP_LOGCAT".AttributeExtractor.Delegation");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".AttributeExtractor.Delegation");
const vector<saml2::Condition*>& conditions = const_cast<const saml2::Conditions*>(assertion->getConditions())->getConditions();
for (vector<saml2::Condition*>::const_iterator c = conditions.begin(); c != conditions.end(); ++c) {
};
QueryResolver::QueryResolver(const DOMElement* e)
- : m_log(Category::getInstance(SHIBSP_LOGCAT".AttributeResolver.Query")),
+ : m_log(Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver.Query")),
m_policyId(XMLHelper::getAttrString(e, nullptr, policyId)),
m_subjectMatch(XMLHelper::getAttrBool(e, false, subjectMatch))
{
};
SimpleAggregationResolver::SimpleAggregationResolver(const DOMElement* e)
- : m_log(Category::getInstance(SHIBSP_LOGCAT".AttributeResolver.SimpleAggregation")),
+ : m_log(Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver.SimpleAggregation")),
m_policyId(XMLHelper::getAttrString(e, nullptr, policyId)),
m_subjectMatch(XMLHelper::getAttrBool(e, false, subjectMatch))
{
class XMLExtractor : public AttributeExtractor, public ReloadableXMLFile
{
public:
- XMLExtractor(const DOMElement* e) : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT".AttributeExtractor.XML")) {
+ XMLExtractor(const DOMElement* e) : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT ".AttributeExtractor.XML")) {
if (m_local && m_lock)
m_log.warn("attribute mappings are reloadable; be sure to restart web server when adding new attribute IDs");
background_load();
response = client.receiveSAML();
}
catch (std::exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".ArtifactResolver").error("exception resolving SAML 1.x artifact(s): %s", ex.what());
+ Category::getInstance(SHIBSP_LOGCAT ".ArtifactResolver").error("exception resolving SAML 1.x artifact(s): %s", ex.what());
soaper.reset();
}
}
opensaml::SecurityPolicy& policy
) const
{
- Category& log = Category::getInstance(SHIBSP_LOGCAT".ArtifactResolver");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".ArtifactResolver");
MetadataCredentialCriteria mcc(ssoDescriptor);
shibsp::SecurityPolicy& sppolicy = dynamic_cast<shibsp::SecurityPolicy&>(policy);
}
}
else {
- Category::getInstance(SHIBSP_LOGCAT".SOAPClient").warn("no signing credential resolved, leaving message unsigned");
+ Category::getInstance(SHIBSP_LOGCAT ".SOAPClient").warn("no signing credential resolved, leaving message unsigned");
}
}
else {
- Category::getInstance(SHIBSP_LOGCAT".SOAPClient").warn("no CredentialResolver available, leaving unsigned");
+ Category::getInstance(SHIBSP_LOGCAT ".SOAPClient").warn("no CredentialResolver available, leaving unsigned");
}
}
#ifdef _DEBUG
xmltooling::NDC("prepareTransport");
#endif
- Category& log=Category::getInstance(SHIBSP_LOGCAT".SOAPClient");
+ Category& log=Category::getInstance(SHIBSP_LOGCAT ".SOAPClient");
log.debug("prepping SOAP transport for use by application (%s)", m_app.getId());
pair<bool,bool> flag = m_relyingParty->getBool("requireConfidentiality");
{
public:
XMLProtocolProvider(const DOMElement* e)
- : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT".ProtocolProvider.XML")) {
+ : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT ".ProtocolProvider.XML")) {
background_load(); // guarantees an exception or the policy is loaded
}
void Handler::log(SPRequest::SPLogLevel level, const string& msg) const
{
- Category::getInstance(SHIBSP_LOGCAT".Handler").log(
+ Category::getInstance(SHIBSP_LOGCAT ".Handler").log(
(level == SPRequest::SPDebug ? Priority::DEBUG :
(level == SPRequest::SPInfo ? Priority::INFO :
(level == SPRequest::SPWarn ? Priority::WARN :
};
AssertionLookup::AssertionLookup(const DOMElement* e, const char* appId)
- : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT".AssertionLookup"), "exportACL", "127.0.0.1 ::1")
+ : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT ".AssertionLookup"), "exportACL", "127.0.0.1 ::1")
{
setAddress("run::AssertionLookup");
}
};
AttributeCheckerHandler::AttributeCheckerHandler(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".AttributeCheckerHandler"), &g_Blocker)
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".AttributeCheckerHandler"), &g_Blocker)
{
if (!SPConfig::getConfig().isEnabled(SPConfig::InProcess))
return;
};
ChainingLogoutInitiator::ChainingLogoutInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".LogoutInitiator.Chaining"), &g_LINFilter)
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".LogoutInitiator.Chaining"), &g_LINFilter)
{
SPConfig& conf = SPConfig::getConfig();
};
ChainingSessionInitiator::ChainingSessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.Chaining"), &g_SINFilter)
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.Chaining"), &g_SINFilter)
{
SPConfig& conf = SPConfig::getConfig();
{
public:
CookieSessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.Cookie")),
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.Cookie")),
m_followMultiple(getBool("followMultiple").second) {
m_supportedOptions.insert("isPassive");
}
};
DiscoveryFeed::DiscoveryFeed(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".DiscoveryFeed"), &g_Blocker), m_cacheToClient(false)
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".DiscoveryFeed"), &g_Blocker), m_cacheToClient(false)
{
pair<bool,const char*> prop = getString("Location");
if (!prop.first)
};
ExternalAuth::ExternalAuth(const DOMElement* e, const char* appId)
- : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT".ExternalAuth"), "acl", "127.0.0.1 ::1")
+ : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT ".ExternalAuth"), "acl", "127.0.0.1 ::1")
{
setAddress("run::ExternalAuth");
}
{
public:
FormSessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.Form")), m_template(getString("template").second) {
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.Form")), m_template(getString("template").second) {
if (!m_template)
throw ConfigurationException("Form SessionInitiator requires a template property.");
}
};
LocalLogoutInitiator::LocalLogoutInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".LogoutInitiator.Local")), m_appId(appId)
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".LogoutInitiator.Local")), m_appId(appId)
{
pair<bool,const char*> loc = getString("Location");
if (loc.first) {
const Application* app=aid ? SPConfig::getConfig().getServiceProvider()->getApplication(aid) : nullptr;
if (!app) {
// Something's horribly wrong.
- Category::getInstance(SHIBSP_LOGCAT".Logout").error("couldn't find application (%s) for logout", aid ? aid : "(missing)");
+ Category::getInstance(SHIBSP_LOGCAT ".Logout").error("couldn't find application (%s) for logout", aid ? aid : "(missing)");
throw ConfigurationException("Unable to locate application for logout, deleted?");
}
) const
{
if (sessions.empty()) {
- Category::getInstance(SHIBSP_LOGCAT".Logout").error("no sessions supplied to back channel notification method");
+ Category::getInstance(SHIBSP_LOGCAT ".Logout").error("no sessions supplied to back channel notification method");
return false;
}
delete soaper.receive();
}
catch (std::exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".Logout").error("error notifying application of logout event: %s", ex.what());
+ Category::getInstance(SHIBSP_LOGCAT ".Logout").error("error notifying application of logout event: %s", ex.what());
result = false;
}
soaper.reset();
return logout_event;
}
else {
- Category::getInstance(SHIBSP_LOGCAT".Logout").warn("unable to audit event, log event object was of an incorrect type");
+ Category::getInstance(SHIBSP_LOGCAT ".Logout").warn("unable to audit event, log event object was of an incorrect type");
}
}
catch (std::exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".Logout").warn("exception auditing event: %s", ex.what());
+ Category::getInstance(SHIBSP_LOGCAT ".Logout").warn("exception auditing event: %s", ex.what());
}
return nullptr;
}
};
MetadataGenerator::MetadataGenerator(const DOMElement* e, const char* appId)
- : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT".MetadataGenerator"))
+ : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT ".MetadataGenerator"))
#ifndef SHIBSP_LITE
,m_http(0), m_https(0), m_encryptionBuilder(nullptr), m_digestBuilder(nullptr)
#endif
}
catch(XSECException& e) {
auto_ptr_char temp(e.getMsg());
- Category::getInstance(SHIBSP_LOGCAT".SPRequest").error("XML-Security exception loading client certificate: %s", temp.get());
+ Category::getInstance(SHIBSP_LOGCAT ".SPRequest").error("XML-Security exception loading client certificate: %s", temp.get());
}
catch(XSECCryptoException& e) {
- Category::getInstance(SHIBSP_LOGCAT".SPRequest").error("XML-Security exception loading client certificate: %s", e.getMsg());
+ Category::getInstance(SHIBSP_LOGCAT ".SPRequest").error("XML-Security exception loading client certificate: %s", e.getMsg());
}
cert = certs.next();
}
if (listener)
listener->regListener(m_address.c_str(), this);
else
- Category::getInstance(SHIBSP_LOGCAT".Handler").info("no ListenerService available, handler remoting disabled");
+ Category::getInstance(SHIBSP_LOGCAT ".Handler").info("no ListenerService available, handler remoting disabled");
}
}
{
public:
SAML1Consumer(const DOMElement* e, const char* appId)
- : AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT".SSO.SAML1")) {
+ : AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT ".SSO.SAML1")) {
#ifndef SHIBSP_LITE
m_post = XMLString::equals(getString("Binding").second, samlconstants::SAML1_PROFILE_BROWSER_POST);
if (SPConfig::getConfig().isEnabled(SPConfig::OutOfProcess))
};
SAML2ArtifactResolution::SAML2ArtifactResolution(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".ArtifactResolution.SAML2"))
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".ArtifactResolution.SAML2"))
{
#ifndef SHIBSP_LITE
if (SPConfig::getConfig().isEnabled(SPConfig::OutOfProcess)) {
{
public:
SAML2Consumer(const DOMElement* e, const char* appId)
- : AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT".SSO.SAML2")) {
+ : AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT ".SSO.SAML2")) {
#ifndef SHIBSP_LITE
if (SPConfig::getConfig().isEnabled(SPConfig::OutOfProcess))
m_ssoRule.reset(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(BEARER_POLICY_RULE, e));
};
SAML2Logout::SAML2Logout(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".Logout.SAML2"))
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".Logout.SAML2"))
#ifndef SHIBSP_LITE
,m_protocol(samlconstants::SAML20P_NS)
#endif
};
SAML2LogoutInitiator::SAML2LogoutInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".LogoutInitiator.SAML2")), m_appId(appId), m_protocol(samlconstants::SAML20P_NS)
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".LogoutInitiator.SAML2")), m_appId(appId), m_protocol(samlconstants::SAML20P_NS)
#ifndef SHIBSP_LITE
,m_async(true)
#endif
};
SAML2NameIDMgmt::SAML2NameIDMgmt(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".NameIDMgmt.SAML2"))
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".NameIDMgmt.SAML2"))
{
#ifndef SHIBSP_LITE
if (SPConfig::getConfig().isEnabled(SPConfig::OutOfProcess)) {
};
SAML2SessionInitiator::SAML2SessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.SAML2"), &g_SINFilter, &m_remapper), m_appId(appId),
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.SAML2"), &g_SINFilter, &m_remapper), m_appId(appId),
m_paosNS(samlconstants::PAOS_NS), m_ecpNS(samlconstants::SAML20ECP_NS), m_paosBinding(samlconstants::SAML20_BINDING_PAOS)
#ifdef SHIBSP_LITE
,m_ecp(false)
};
SAMLDSSessionInitiator::SAMLDSSessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.SAMLDS")), m_url(nullptr), m_returnParam(nullptr)
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.SAMLDS")), m_url(nullptr), m_returnParam(nullptr)
{
pair<bool,const char*> url = getString("URL");
if (!url.first)
};
SessionHandler::SessionHandler(const DOMElement* e, const char* appId)
- : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionHandler")), m_values(false)
+ : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionHandler")), m_values(false)
{
pair<bool,const char*> prop = getString("contentType");
if (prop.first)
return ar_event;
}
else {
- Category::getInstance(SHIBSP_LOGCAT".SessionInitiator").warn("unable to audit event, log event object was of an incorrect type");
+ Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator").warn("unable to audit event, log event object was of an incorrect type");
}
}
catch (exception& ex) {
- Category::getInstance(SHIBSP_LOGCAT".SessionInitiator").warn("exception auditing event: %s", ex.what());
+ Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator").warn("exception auditing event: %s", ex.what());
}
return nullptr;
}
{
public:
Shib1SessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.Shib1"), nullptr, &m_remapper), m_appId(appId) {
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.Shib1"), nullptr, &m_remapper), m_appId(appId) {
// If Location isn't set, defer address registration until the setParent call.
pair<bool,const char*> loc = getString("Location");
if (loc.first) {
};
StatusHandler::StatusHandler(const DOMElement* e, const char* appId)
- : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT".StatusHandler"))
+ : SecuredHandler(e, Category::getInstance(SHIBSP_LOGCAT ".StatusHandler"))
{
string address(appId);
address += getString("Location").second;
{
public:
TransformSessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.Transform"), &g_TSINFilter), m_appId(appId) {
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.Transform"), &g_TSINFilter), m_appId(appId) {
// If Location isn't set, defer address registration until the setParent call.
pair<bool,const char*> loc = getString("Location");
if (loc.first) {
{
public:
WAYFSessionInitiator(const DOMElement* e, const char* appId)
- : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT".SessionInitiator.WAYF"), nullptr, &m_remapper), m_url(nullptr) {
+ : AbstractHandler(e, Category::getInstance(SHIBSP_LOGCAT ".SessionInitiator.WAYF"), nullptr, &m_remapper), m_url(nullptr) {
pair<bool,const char*> url = getString("URL");
if (!url.first)
throw ConfigurationException("WAYF SessionInitiator requires a URL property.");
while (e) {
string t(XMLHelper::getAttrString(e, nullptr, _type));
if (!t.empty()) {
- Category::getInstance(SHIBSP_LOGCAT".AccessControl.Chaining").info("building AccessControl provider of type (%s)...", t.c_str());
+ Category::getInstance(SHIBSP_LOGCAT ".AccessControl.Chaining").info("building AccessControl provider of type (%s)...", t.c_str());
auto_ptr<AccessControl> np(SPConfig::getConfig().AccessControlManager.newPlugin(t.c_str(), e));
m_ac.push_back(np.get());
np.release();
return;
if (!SPConfig::getConfig().isEnabled(SPConfig::OutOfProcess)) {
- DDF in("touch::"STORAGESERVICE_SESSION_CACHE"::SessionCache"), out;
+ DDF in("touch::" STORAGESERVICE_SESSION_CACHE "::SessionCache"), out;
DDFJanitor jin(in);
in.structure();
in.addmember("key").string(getID());
}
SSCache::SSCache(const DOMElement* e)
- : m_log(Category::getInstance(SHIBSP_LOGCAT".SessionCache")), inproc(true),
+ : m_log(Category::getInstance(SHIBSP_LOGCAT ".SessionCache")), inproc(true),
#ifndef SHIBSP_LITE
m_storage(nullptr), m_storage_lite(nullptr), m_cacheAssertions(true), m_reverseIndex(true),
#endif
#ifndef SHIBSP_LITE
else {
if (listener && conf.isEnabled(SPConfig::OutOfProcess)) {
- listener->regListener("find::"STORAGESERVICE_SESSION_CACHE"::SessionCache",this);
- listener->regListener("remove::"STORAGESERVICE_SESSION_CACHE"::SessionCache",this);
- listener->regListener("touch::"STORAGESERVICE_SESSION_CACHE"::SessionCache",this);
+ listener->regListener("find::" STORAGESERVICE_SESSION_CACHE "::SessionCache",this);
+ listener->regListener("remove::" STORAGESERVICE_SESSION_CACHE "::SessionCache",this);
+ listener->regListener("touch::" STORAGESERVICE_SESSION_CACHE "::SessionCache",this);
}
else {
m_log.info("no ListenerService available, cache remoting disabled");
SPConfig& conf = SPConfig::getConfig();
ListenerService* listener=conf.getServiceProvider()->getListenerService(false);
if (listener && conf.isEnabled(SPConfig::OutOfProcess)) {
- listener->unregListener("find::"STORAGESERVICE_SESSION_CACHE"::SessionCache",this);
- listener->unregListener("remove::"STORAGESERVICE_SESSION_CACHE"::SessionCache",this);
- listener->unregListener("touch::"STORAGESERVICE_SESSION_CACHE"::SessionCache",this);
+ listener->unregListener("find::" STORAGESERVICE_SESSION_CACHE "::SessionCache",this);
+ listener->unregListener("remove::" STORAGESERVICE_SESSION_CACHE "::SessionCache",this);
+ listener->unregListener("touch::" STORAGESERVICE_SESSION_CACHE "::SessionCache",this);
}
}
#endif
if (!SPConfig::getConfig().isEnabled(SPConfig::OutOfProcess)) {
m_log.debug("session not found locally, remoting the search");
// Remote the request.
- DDF in("find::"STORAGESERVICE_SESSION_CACHE"::SessionCache"), out;
+ DDF in("find::" STORAGESERVICE_SESSION_CACHE "::SessionCache"), out;
DDFJanitor jin(in);
in.structure();
in.addmember("key").string(key);
}
else {
// Remote the request.
- DDF in("remove::"STORAGESERVICE_SESSION_CACHE"::SessionCache");
+ DDF in("remove::" STORAGESERVICE_SESSION_CACHE "::SessionCache");
DDFJanitor jin(in);
in.structure();
in.addmember("key").string(key);
if (!app)
throw ListenerException("Application not found, check configuration?");
- if (!strcmp(in.name(),"find::"STORAGESERVICE_SESSION_CACHE"::SessionCache")) {
+ if (!strcmp(in.name(),"find::" STORAGESERVICE_SESSION_CACHE "::SessionCache")) {
const char* key=in["key"].string();
if (!key)
throw ListenerException("Required parameters missing for session lookup.");
// Send the record back.
out << record;
}
- else if (!strcmp(in.name(),"touch::"STORAGESERVICE_SESSION_CACHE"::SessionCache")) {
+ else if (!strcmp(in.name(),"touch::" STORAGESERVICE_SESSION_CACHE "::SessionCache")) {
const char* key=in["key"].string();
if (!key)
throw ListenerException("Required parameters missing for session check.");
out << ret;
}
}
- else if (!strcmp(in.name(),"remove::"STORAGESERVICE_SESSION_CACHE"::SessionCache")) {
+ else if (!strcmp(in.name(),"remove::" STORAGESERVICE_SESSION_CACHE "::SessionCache")) {
const char* key=in["key"].string();
if (!key)
throw ListenerException("Required parameter missing for session removal.");
{
public:
XMLAccessControl(const DOMElement* e)
- : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT".AccessControl.XML")) {
+ : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT ".AccessControl.XML")) {
background_load(); // guarantees an exception or the policy is loaded
}
class XMLRequestMapper : public RequestMapper, public ReloadableXMLFile
{
public:
- XMLRequestMapper(const DOMElement* e) : ReloadableXMLFile(e,Category::getInstance(SHIBSP_LOGCAT".RequestMapper")) {
+ XMLRequestMapper(const DOMElement* e) : ReloadableXMLFile(e,Category::getInstance(SHIBSP_LOGCAT ".RequestMapper")) {
background_load();
}
{
public:
XMLSecurityPolicyProvider(const DOMElement* e)
- : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT".SecurityPolicyProvider.XML")) {
+ : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT ".SecurityPolicyProvider.XML")) {
background_load(); // guarantees an exception or the policy is loaded
}
#endif
{
public:
- XMLConfig(const DOMElement* e) : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT".Config")) {}
+ XMLConfig(const DOMElement* e) : ReloadableXMLFile(e, Category::getInstance(SHIBSP_LOGCAT ".Config")) {}
void init() {
background_load();
#ifdef _DEBUG
xmltooling::NDC ndc("XMLApplication");
#endif
- Category& log = Category::getInstance(SHIBSP_LOGCAT".Application");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".Application");
// First load any property sets.
map<string,string> remapper;
boost::bind(startsWithI, url, boost::bind(&string::c_str, _1))) != m_redirectWhitelist.end()) {
return;
}
- Category::getInstance(SHIBSP_LOGCAT".Application").warn("redirectLimit policy enforced, blocked redirect to (%s)", url);
+ Category::getInstance(SHIBSP_LOGCAT ".Application").warn("redirectLimit policy enforced, blocked redirect to (%s)", url);
throw opensaml::SecurityPolicyException("Blocked unacceptable redirect location.");
}
}
}
}
else {
- Category::getInstance(SHIBSP_LOGCAT".ServiceProvider").error(
+ Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider").error(
"Storage-backed RelayState with invalid StorageService ID (%s)", id
);
}
storage->createText("RelayState", rsKey.c_str(), value, time(nullptr) + 600);
}
else {
- Category::getInstance(SHIBSP_LOGCAT".ServiceProvider").error(
+ Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider").error(
"Storage-backed RelayState with invalid StorageService ID (%s)", id
);
}
}
}
else {
- Category::getInstance(SHIBSP_LOGCAT".ServiceProvider").error(
+ Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider").error(
"Storage-backed PostData with invalid StorageService ID (%s)", id
);
}
storage->createText("PostData", rsKey.c_str(), params.str().c_str(), time(nullptr) + 600);
}
else {
- Category::getInstance(SHIBSP_LOGCAT".ServiceProvider").error(
+ Category::getInstance(SHIBSP_LOGCAT ".ServiceProvider").error(
"Storage-backed PostData with invalid StorageService ID (%s)", id
);
}
#ifdef _DEBUG
xmltooling::NDC("resolve");
#endif
- Category& log=Category::getInstance(SHIBSP_LOGCAT".MetadataProvider.Dynamic");
+ Category& log=Category::getInstance(SHIBSP_LOGCAT ".MetadataProvider.Dynamic");
string name;
if (criteria.entityID_ascii) {
if (i!=m_listenerMap.end())
ret=i->second;
m_listenerMap[address]=listener;
- Category::getInstance(SHIBSP_LOGCAT".Listener").info("registered remoted message endpoint (%s)",address);
+ Category::getInstance(SHIBSP_LOGCAT ".Listener").info("registered remoted message endpoint (%s)",address);
return ret;
}
m_listenerMap[address]=restore;
else
m_listenerMap.erase(address);
- Category::getInstance(SHIBSP_LOGCAT".Listener").info("unregistered remoted message endpoint (%s)",address);
+ Category::getInstance(SHIBSP_LOGCAT ".Listener").info("unregistered remoted message endpoint (%s)",address);
return true;
}
return false;
}
SocketListener::SocketListener(const DOMElement* e)
- : m_catchAll(false), log(&Category::getInstance(SHIBSP_LOGCAT".Listener")),
+ : m_catchAll(false), log(&Category::getInstance(SHIBSP_LOGCAT ".Listener")),
m_shutdown(nullptr), m_stackSize(0), m_socket((ShibSocket)0)
{
// Are we a client?
int ServerThread::job()
{
- Category& log = Category::getInstance(SHIBSP_LOGCAT".Listener");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".Listener");
bool incomingError = true; // set false once incoming message is received
ostringstream sink;
return;
m_root=e;
if (!log)
- log = &Category::getInstance(SHIBSP_LOGCAT".PropertySet");
+ log = &Category::getInstance(SHIBSP_LOGCAT ".PropertySet");
// Process each attribute as a property.
DOMNamedNodeMap* attrs=m_root->getAttributes();
bool IPRange::contains(const struct sockaddr* address) const
{
- Category& log = Category::getInstance(SHIBSP_LOGCAT".IPRange");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".IPRange");
if (address->sa_family == AF_INET) {
if (m_addressLength != 32)
ServiceProvider* sp=conf.getServiceProvider();
sp->lock();
- Category& log = Category::getInstance(SHIBSP_LOGCAT".Utility.MDQuery");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".Utility.MDQuery");
const Application* app = sp->getApplication(appID);
if (!app) {
{
public:
ResolverTest(const DOMElement* e, const char* appId)
- : shibsp::AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT".Utilities.ResolverTest")) {
+ : shibsp::AssertionConsumerService(e, appId, Category::getInstance(SHIBSP_LOGCAT ".Utilities.ResolverTest")) {
}
virtual ~ResolverTest() {}
ServiceProvider* sp=conf.getServiceProvider();
sp->lock();
- Category& log = Category::getInstance(SHIBSP_LOGCAT".Utility.ResolverTest");
+ Category& log = Category::getInstance(SHIBSP_LOGCAT ".Utility.ResolverTest");
const Application* app = sp->getApplication(a_param);
if (!app) {