costin 2003/03/11 21:59:30
Modified: catalina/src/share/org/apache/catalina/authenticator
AuthenticatorBase.java
Log:
commons-logging
Revision Changes Path
1.6 +38 -34
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/AuthenticatorBase.java
Index: AuthenticatorBase.java
===================================================================
RCS file:
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/AuthenticatorBase.java,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -r1.5 -r1.6
--- AuthenticatorBase.java 16 Nov 2002 05:05:42 -0000 1.5
+++ AuthenticatorBase.java 12 Mar 2003 05:59:30 -0000 1.6
@@ -102,6 +102,8 @@
import org.apache.catalina.util.RequestUtil;
import org.apache.catalina.util.StringManager;
import org.apache.catalina.valves.ValveBase;
+import org.apache.commons.logging.Log;
+import org.apache.commons.logging.LogFactory;
/**
@@ -128,6 +130,7 @@
public abstract class AuthenticatorBase
extends ValveBase
implements Authenticator, Lifecycle {
+ private static Log log = LogFactory.getLog(AuthenticatorBase.class);
// ----------------------------------------------------- Instance Variables
@@ -443,8 +446,8 @@
}
HttpRequest hrequest = (HttpRequest) request;
HttpResponse hresponse = (HttpResponse) response;
- if (debug >= 1)
- log("Security checking request " +
+ if (log.isDebugEnabled())
+ log.debug("Security checking request " +
((HttpServletRequest) request.getRequest()).getMethod() + " " +
((HttpServletRequest) request.getRequest()).getRequestURI());
LoginConfig config = this.context.getLoginConfig();
@@ -458,8 +461,8 @@
if (session != null) {
principal = session.getPrincipal();
if (principal != null) {
- if (debug >= 1)
- log("We have cached auth type " +
+ if (log.isDebugEnabled())
+ log.debug("We have cached auth type " +
session.getAuthType() +
" for principal " +
session.getPrincipal());
@@ -478,8 +481,8 @@
if (requestURI.startsWith(contextPath) &&
requestURI.endsWith(Constants.FORM_ACTION)) {
if (!authenticate(hrequest, hresponse, config)) {
- if (debug >= 1)
- log(" Failed authenticate() test");
+ if (log.isDebugEnabled())
+ log.debug(" Failed authenticate() test ??" + requestURI );
return;
}
}
@@ -491,13 +494,13 @@
if ((constraint == null) /* &&
(!Constants.FORM_METHOD.equals(config.getAuthMethod())) */ ) {
- if (debug >= 1)
- log(" Not subject to any constraint");
+ if (log.isDebugEnabled())
+ log.debug(" Not subject to any constraint");
context.invokeNext(request, response);
return;
}
- if ((debug >= 1) && (constraint != null))
- log(" Subject to constraint " + constraint);
+ if ((log.isDebugEnabled()) && (constraint != null))
+ log.debug(" Subject to constraint " + constraint);
// Make sure that constrained resources are not cached by web proxies
// or browsers as caching can provide a security hole
@@ -511,12 +514,12 @@
}
// Enforce any user data constraint for this security constraint
- if (debug >= 1)
- log(" Calling hasUserDataPermission()");
+ if (log.isDebugEnabled())
+ log.debug(" Calling hasUserDataPermission()");
if (!realm.hasUserDataPermission(hrequest, hresponse, constraint)) {
- if (debug >= 1)
- log(" Failed hasUserDataPermission() test");
+ if (log.isDebugEnabled())
+ log.debug(" Failed hasUserDataPermission() test");
// ASSERT: Authenticator already set the appropriate
// HTTP status code, so we do not have to do anything special
return;
@@ -524,11 +527,11 @@
// Authenticate based upon the specified login configuration
if (constraint.getAuthConstraint()) {
- if (debug >= 1)
- log(" Calling authenticate()");
+ if (log.isDebugEnabled())
+ log.debug(" Calling authenticate()");
if (!authenticate(hrequest, hresponse, config)) {
- if (debug >= 1)
- log(" Failed authenticate() test");
+ if (log.isDebugEnabled())
+ log.debug(" Failed authenticate() test");
// ASSERT: Authenticator already set the appropriate
// HTTP status code, so we do not have to do anything special
return;
@@ -537,12 +540,12 @@
// Perform access control based on the specified role(s)
if (constraint.getAuthConstraint()) {
- if (debug >= 1)
- log(" Calling accessControl()");
+ if (log.isDebugEnabled())
+ log.debug(" Calling accessControl()");
if (!realm.hasResourcePermission(hrequest, hresponse, constraint,
this.context)) {
- if (debug >= 1)
- log(" Failed accessControl() test");
+ if (log.isDebugEnabled())
+ log.debug(" Failed accessControl() test");
// ASSERT: AccessControl method has already set the appropriate
// HTTP status code, so we do not have to do anything special
return;
@@ -550,8 +553,8 @@
}
// Any and all specified constraints have been satisfied
- if (debug >= 1)
- log(" Successfully passed all security constraints");
+ if (log.isDebugEnabled())
+ log.debug(" Successfully passed all security constraints");
context.invokeNext(request, response);
}
@@ -778,8 +781,8 @@
Principal principal, String authType,
String username, String password) {
- if (debug >= 1)
- log("Authenticated '" + principal.getName() + "' with type '"
+ if (log.isDebugEnabled())
+ log.debug("Authenticated '" + principal.getName() + "' with type '"
+ authType + "'");
// Cache the authentication information in our request
@@ -879,6 +882,7 @@
if ("org.apache.catalina.core.StandardContext".equals
(context.getClass().getName())) {
try {
+ // XXX What is this ???
Class paramTypes[] = new Class[0];
Object paramValues[] = new Object[0];
Method method =
@@ -886,7 +890,7 @@
Integer result = (Integer) method.invoke(context, paramValues);
setDebug(result.intValue());
} catch (Exception e) {
- log("Exception getting debug value", e);
+ log.error("Exception getting debug value", e);
}
}
started = true;
@@ -909,11 +913,11 @@
if (sso == null)
parent = parent.getParent();
}
- if (debug >= 1) {
+ if (log.isDebugEnabled()) {
if (sso != null)
- log("Found SingleSignOn Valve at " + sso);
+ log.debug("Found SingleSignOn Valve at " + sso);
else
- log("No SingleSignOn Valve is present");
+ log.debug("No SingleSignOn Valve is present");
}
}
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]