Author: kaushalye
Date: Fri Apr 11 21:01:18 2008
New Revision: 647373
URL: http://svn.apache.org/viewvc?rev=647373&view=rev
Log:
Changing some INFO logs to DEBUG logs
Modified:
webservices/rampart/trunk/c/src/util/rampart_context.c
webservices/rampart/trunk/c/src/util/rampart_replay_detector.c
webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
webservices/rampart/trunk/c/src/util/rampart_timestamp_token.c
webservices/rampart/trunk/c/src/util/rampart_username_token.c
webservices/rampart/trunk/c/src/util/rampart_util.c
Modified: webservices/rampart/trunk/c/src/util/rampart_context.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_context.c?rev=647373&r1=647372&r2=647373&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_context.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_context.c Fri Apr 11 21:01:18
2008
@@ -1284,7 +1284,7 @@
int i = 0;
soap_header_blocks =
axiom_soap_header_get_header_blocks_with_namespace_uri(soap_header, env,
nspace);
if(!soap_header_blocks){
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] Header cannot
find with namespace %s", nspace);
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] Header cannot find with namespace %s", nspace);
return AXIS2_SUCCESS;
}
for(i=0 ; i<axutil_array_list_size(soap_header_blocks, env); i++)
@@ -1340,7 +1340,7 @@
}
else
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] Cannot
find the header with name %s", local_name);
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] Cannot find the header with name %s", local_name);
return AXIS2_SUCCESS;
}
}
@@ -1489,7 +1489,7 @@
wss = rp_secpolicy_get_wss(rampart_context->secpolicy,env);
if(!wss)
{
- AXIS2_LOG_INFO(env->log,"Problem identifying the key Identifier." );
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,"Problem identifying the key
Identifier." );
return identifier;
}
@@ -2130,11 +2130,11 @@
{
if(is_sign)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] Nothing to
sign outside Secyrity header.");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] Nothing to sign outside Secyrity header.");
}
else
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] Nothing to
encrypt outside Secyrity header.");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] Nothing to encrypt outside Secyrity header.");
}
return AXIS2_SUCCESS;
}
@@ -2163,7 +2163,7 @@
axiom_node_t *body_node = NULL;
axiom_node_t *body_child_node = NULL;
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] Including the
body.");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][rampart_context]
Including the body for encryption/sign.");
body = axiom_soap_envelope_get_body(soap_envelope, env);
body_node = axiom_soap_body_get_base_node(body, env);
body_child_node = axiom_node_get_first_element(body_node, env);
@@ -2205,10 +2205,12 @@
items = rp_signed_encrypted_items_get_elements(signed_encrypted_items,env);
if(!items || (axutil_array_list_size(items,env)==0))
{
- if(is_sign)
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] Nothing to
sign outside Secyrity header.");
- else
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] Nothing to
encrypt outside Secyrity header.");
+ if(is_sign){
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] Nothing to sign outside Secyrity header.");
+
+ }else{
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] Nothing to encrypt outside Secyrity header.");
+ }
return AXIS2_FAILURE;
}
else
@@ -2249,11 +2251,12 @@
parts =
rp_signed_encrypted_items_get_elements(encrypted_items,env);
if(!parts||(axutil_array_list_size(parts,env)==0))
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context]No Signed
parts specified Nothing to Verify");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] No Signed parts specified Nothing to Verify");
return AXIS2_FALSE;
}
- else
+ else{
return AXIS2_TRUE;
+ }
}
}
parts = rp_signed_encrypted_parts_get_headers(encrypted_parts,env);
@@ -2264,7 +2267,7 @@
else
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context]No encryption
parts specified Nothing to decrypt");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context]No encryption parts specified Nothing to decrypt");
return AXIS2_FALSE;
}
}
@@ -2292,7 +2295,7 @@
parts = rp_signed_encrypted_items_get_elements(signed_items,env);
if(!parts||(axutil_array_list_size(parts,env)==0))
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context]No Signed
parts specified Nothing to Verify");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context]No Signed parts specified Nothing to Verify");
return AXIS2_FALSE;
}
else
@@ -2307,7 +2310,7 @@
else
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context]No Signed
parts specified Nothing to Verify");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context]No Signed parts specified Nothing to Verify");
return AXIS2_FALSE;
}
}
Modified: webservices/rampart/trunk/c/src/util/rampart_replay_detector.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_replay_detector.c?rev=647373&r1=647372&r2=647373&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_replay_detector.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_replay_detector.c Fri Apr 11
21:01:18 2008
@@ -95,7 +95,7 @@
return ll;
}else{
ll = rampart_replay_detector_set_ll_db(env, ctx);
- AXIS2_LOG_INFO(env->log, "[rampart][rrd] Cannot get the property %s
from msg_ctx. Creating a new DB", RAMPART_RD_DB_PROP);
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][rrd] Cannot get the
property %s from msg_ctx. Creating a new DB", RAMPART_RD_DB_PROP);
return ll;
}
}
@@ -130,7 +130,8 @@
return hash;
}else{
hash = rampart_replay_detector_set_default_db(env, ctx);
- AXIS2_LOG_INFO(env->log, "[rampart][rrd] Cannot get the property %s
from msg_ctx. Creating a new DB", RAMPART_RD_DB_PROP);
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
+ "[rampart][rrd] Cannot get the property %s from msg_ctx. Creating
a new DB", RAMPART_RD_DB_PROP);
return hash;
}
}
Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c?rev=647373&r1=647372&r2=647373&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c Fri Apr
11 21:01:18 2008
@@ -467,7 +467,7 @@
if(rampart_context_is_include_timestamp(rampart_context,env))
{
int ttl = -1;
- AXIS2_LOG_INFO(env->log, "[rampart][shb] Building Timestamp Token");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Building
Timestamp Token");
AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Using default
timeToLive value %d",
RAMPART_TIMESTAMP_TOKEN_DEFAULT_TIME_TO_LIVE);
ttl = rampart_context_get_ttl(rampart_context,env);
@@ -493,7 +493,7 @@
/*Now we are passing rampart_context here so inside this method
relevant parameters are extracted. */
- AXIS2_LOG_INFO(env->log, "[rampart][shb] Building UsernmaeToken");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Building
UsernmaeToken");
status = rampart_username_token_build(
env,
rampart_context,
Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c?rev=647373&r1=647372&r2=647373&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
(original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c Fri Apr
11 21:01:18 2008
@@ -763,7 +763,7 @@
/*Get the i-th element and decrypt it */
id = (axis2_char_t*)axutil_array_list_get(reference_list, env, i);
- AXIS2_LOG_INFO(env->log, "[rampart][shp] Decrypting node, ID=%s", id);
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] Decrypting
node, ID=%s", id);
/*Need to remove # sign from the ID*/
id2 = axutil_string_substring_starting_at(id, 1);
@@ -845,7 +845,7 @@
oxs_ctx_free(ctx, env);
ctx = NULL;
- AXIS2_LOG_INFO(env->log, "[rampart][shp] Node ID=%s decrypted
successfuly", id);
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] Node ID=%s
decrypted successfuly", id);
}/*end of For loop*/
}
Modified: webservices/rampart/trunk/c/src/util/rampart_timestamp_token.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_timestamp_token.c?rev=647373&r1=647372&r2=647373&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_timestamp_token.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_timestamp_token.c Fri Apr 11
21:01:18 2008
@@ -72,7 +72,8 @@
/*Then we build Expires element*/
/*TIP: If ttl<0 then we dont build the expires element.*/
if(ttl<0){
- AXIS2_LOG_INFO(env->log, " [rampart][ts] ttl is %d which is less
then zero. Thus we do not build the expires element. ");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
+ " [rampart][ts] ttl is %d which is less then zero. Thus we do
not build the expires element. ");
return AXIS2_SUCCESS;
}
expires_ele = axiom_element_create(env, ts_node,
RAMPART_SECURITY_TIMESTAMP_EXPIRES, wsu_ns_obj,
@@ -158,7 +159,8 @@
expires_node = axiom_node_get_next_sibling(created_node, env);
if (!expires_node)
{
- AXIS2_LOG_INFO(env->log, "[rampart][ts]Cannot find expires in
timestamp element. This is not critical. Assume that the message is not
expiring");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
+ "[rampart][ts]Cannot find expires in timestamp element. This is
not critical. Assume that the message is not expiring");
/*If the expire element is not present, it means that the message will
not be expired.*/
AXIS2_FREE(env->allocator, current_val);
current_val = NULL;
Modified: webservices/rampart/trunk/c/src/util/rampart_username_token.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_username_token.c?rev=647373&r1=647372&r2=647373&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_username_token.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_username_token.c Fri Apr 11
21:01:18 2008
@@ -366,7 +366,7 @@
}
else
{
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"\n[rampart][rampart_usernametoken] Unknown
element found %s -> %s",
localname, axiom_element_get_text(element, env,
node));
}
@@ -460,7 +460,7 @@
authn_provider = rampart_context_get_authn_provider(rampart_context, env);
if(authn_provider)
{
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_usernametoken] Password
authentication using AUTH MODULE");
auth_status = rampart_authenticate_un_pw(env, authn_provider,
username, password, nonce, created, password_type,
msg_ctx);
@@ -532,13 +532,13 @@
return AXIS2_FAILURE;
}
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_usernametoken] Password
authentication using CALLBACK MODULE ");
password_from_svr = rampart_callback_password(env,
password_callback, username);
}
}else{
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart][rampart_usernametoken] Using the
password is in the context");
}
Modified: webservices/rampart/trunk/c/src/util/rampart_util.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_util.c?rev=647373&r1=647372&r2=647373&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_util.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_util.c Fri Apr 11 21:01:18 2008
@@ -230,7 +230,7 @@
/*Get the password thru the callback*/
password = RAMPART_CALLBACK_CALLBACK_PASSWORD(callback_module, env,
username, cb_prop_val);
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Password taken from the
callback module . SUCCESS");
+ AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][rampart_util] Password
taken from the callback module . SUCCESS");
return password;
}