luehe       2005/02/23 11:27:56

  Modified:    catalina/src/share/org/apache/catalina/authenticator
                        FormAuthenticator.java NonLoginAuthenticator.java
                        SSLAuthenticator.java SingleSignOn.java
               catalina/src/share/org/apache/catalina/realm
                        DataSourceRealm.java JDBCRealm.java JNDIRealm.java
                        RealmBase.java UserDatabaseRealm.java
               catalina/src/share/org/apache/catalina/valves ValveBase.java
  Log:
  No change in functionality.
  
  Added new "containerLog" instance var to RealmBase and ValveBase, which is
  initialized as "container.getLogger()" inside setContainer().
  
  This will make it easier to do something like
  
    containerLog = LogFactory.getLog(container.logName()+".RealmBase");
  
  in the future, as suggested by Bill Barker.
  
  Revision  Changes    Path
  1.18      +3 -3      
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/FormAuthenticator.java
  
  Index: FormAuthenticator.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/FormAuthenticator.java,v
  retrieving revision 1.17
  retrieving revision 1.18
  diff -u -r1.17 -r1.18
  --- FormAuthenticator.java    18 Feb 2005 23:35:18 -0000      1.17
  +++ FormAuthenticator.java    23 Feb 2005 19:27:56 -0000      1.18
  @@ -272,8 +272,8 @@
           if (session == null)
               session = request.getSessionInternal(false);
           if (session == null) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug("User took so long to log on the 
session expired");
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug("User took so long to log on the session 
expired");
               response.sendError(HttpServletResponse.SC_REQUEST_TIMEOUT,
                                  sm.getString("authenticator.sessionExpired"));
               return (false);
  
  
  
  1.10      +3 -3      
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/NonLoginAuthenticator.java
  
  Index: NonLoginAuthenticator.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/NonLoginAuthenticator.java,v
  retrieving revision 1.9
  retrieving revision 1.10
  diff -u -r1.9 -r1.10
  --- NonLoginAuthenticator.java        18 Feb 2005 23:35:18 -0000      1.9
  +++ NonLoginAuthenticator.java        23 Feb 2005 19:27:56 -0000      1.10
  @@ -91,8 +91,8 @@
               associate(ssoId, getSession(request, true));
           */
           
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug("User authentication is not 
required");
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug("User authentication is not required");
           return (true);
   
   
  
  
  
  1.21      +9 -9      
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/SSLAuthenticator.java
  
  Index: SSLAuthenticator.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/SSLAuthenticator.java,v
  retrieving revision 1.20
  retrieving revision 1.21
  diff -u -r1.20 -r1.21
  --- SSLAuthenticator.java     18 Feb 2005 23:35:18 -0000      1.20
  +++ SSLAuthenticator.java     23 Feb 2005 19:27:56 -0000      1.21
  @@ -89,8 +89,8 @@
           Principal principal = request.getUserPrincipal();
           //String ssoId = (String) request.getNote(Constants.REQ_SSOID_NOTE);
           if (principal != null) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug("Already authenticated '" + 
principal.getName() + "'");
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug("Already authenticated '" + 
principal.getName() + "'");
               // Associate the session with any existing SSO session in order
               // to get coordinated session invalidation at logout
               String ssoId = (String) 
request.getNote(Constants.REQ_SSOID_NOTE);
  @@ -125,8 +125,8 @@
           */
   
           // Retrieve the certificate chain for this client
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug(" Looking up certificates");
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug(" Looking up certificates");
   
           X509Certificate certs[] = (X509Certificate[])
               request.getAttribute(Globals.CERTIFICATES_ATTR);
  @@ -137,8 +137,8 @@
                   request.getAttribute(Globals.CERTIFICATES_ATTR);
           }
           if ((certs == null) || (certs.length < 1)) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug("  No certificates included with 
this request");
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug("  No certificates included with this 
request");
               response.sendError(HttpServletResponse.SC_BAD_REQUEST,
                                  sm.getString("authenticator.certificates"));
               return (false);
  @@ -147,8 +147,8 @@
           // Authenticate the specified certificate chain
           principal = context.getRealm().authenticate(certs);
           if (principal == null) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug("  Realm.authenticate() returned 
false");
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug("  Realm.authenticate() returned false");
               response.sendError(HttpServletResponse.SC_UNAUTHORIZED,
                                  sm.getString("authenticator.unauthorized"));
               return (false);
  
  
  
  1.22      +29 -29    
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/SingleSignOn.java
  
  Index: SingleSignOn.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/authenticator/SingleSignOn.java,v
  retrieving revision 1.21
  retrieving revision 1.22
  diff -u -r1.21 -r1.22
  --- SingleSignOn.java 18 Feb 2005 23:35:18 -0000      1.21
  +++ SingleSignOn.java 23 Feb 2005 19:27:56 -0000      1.22
  @@ -280,8 +280,8 @@
   
           // Look up the single session id associated with this session (if 
any)
           Session session = event.getSession();
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug("Process session destroyed on " + 
session);
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug("Process session destroyed on " + session);
   
           String ssoId = null;
           synchronized (reverse) {
  @@ -336,19 +336,19 @@
           request.removeNote(Constants.REQ_SSOID_NOTE);
   
           // Has a valid user already been authenticated?
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug("Process request for '" + 
request.getRequestURI() + "'");
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug("Process request for '" + 
request.getRequestURI() + "'");
           if (request.getUserPrincipal() != null) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug(" Principal '" + 
request.getUserPrincipal().getName() +
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug(" Principal '" + 
request.getUserPrincipal().getName() +
                       "' has already been authenticated");
               getNext().invoke(request, response);
               return;
           }
   
           // Check for the single sign on cookie
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug(" Checking for SSO cookie");
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug(" Checking for SSO cookie");
           Cookie cookie = null;
           Cookie cookies[] = request.getCookies();
           if (cookies == null)
  @@ -360,19 +360,19 @@
               }
           }
           if (cookie == null) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug(" SSO cookie is not present");
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug(" SSO cookie is not present");
               getNext().invoke(request, response);
               return;
           }
   
           // Look up the cached Principal associated with this cookie value
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug(" Checking for cached principal for 
" + cookie.getValue());
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug(" Checking for cached principal for " + 
cookie.getValue());
           SingleSignOnEntry entry = lookup(cookie.getValue());
           if (entry != null) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug(" Found cached principal '" +
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug(" Found cached principal '" +
                       entry.getPrincipal().getName() + "' with auth type '" +
                       entry.getAuthType() + "'");
               request.setNote(Constants.REQ_SSOID_NOTE, cookie.getValue());
  @@ -382,8 +382,8 @@
                   request.setUserPrincipal(entry.getPrincipal());
               }
           } else {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug(" No cached principal found, 
erasing SSO cookie");
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug(" No cached principal found, erasing SSO 
cookie");
               cookie.setMaxAge(0);
               response.addCookie(cookie);
           }
  @@ -425,8 +425,8 @@
        */
       protected void associate(String ssoId, Session session) {
   
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug("Associate sso id " + ssoId + " with 
session " + session);
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug("Associate sso id " + ssoId + " with session 
" + session);
   
           SingleSignOnEntry sso = lookup(ssoId);
           if (sso != null)
  @@ -475,8 +475,8 @@
        */
       protected void deregister(String ssoId) {
   
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug("Deregistering sso id '" + ssoId + 
"'");
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug("Deregistering sso id '" + ssoId + "'");
   
           // Look up and remove the corresponding SingleSignOnEntry
           SingleSignOnEntry sso = null;
  @@ -490,8 +490,8 @@
           // Expire any associated sessions
           Session sessions[] = sso.findSessions();
           for (int i = 0; i < sessions.length; i++) {
  -            if (container.getLogger().isTraceEnabled())
  -                container.getLogger().trace(" Invalidating session " + 
sessions[i]);
  +            if (containerLog.isTraceEnabled())
  +                containerLog.trace(" Invalidating session " + sessions[i]);
               // Remove from reverse cache first to avoid recursion
               synchronized (reverse) {
                   reverse.remove(sessions[i]);
  @@ -570,8 +570,8 @@
       protected void register(String ssoId, Principal principal, String 
authType,
                     String username, String password) {
   
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug("Registering sso id '" + ssoId + "' 
for user '" +
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug("Registering sso id '" + ssoId + "' for user 
'" +
                   principal.getName() + "' with auth type '" + authType + "'");
   
           synchronized (cache) {
  @@ -612,8 +612,8 @@
   
           SingleSignOnEntry sso = lookup(ssoId);
           if (sso != null && !sso.getCanReauthenticate()) {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug("Update sso id " + ssoId + " to 
auth type " + authType);
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug("Update sso id " + ssoId + " to auth type 
" + authType);
   
               synchronized(sso) {
                   sso.updateCredentials(principal, authType, username, 
password);
  @@ -647,8 +647,8 @@
        */
       protected void removeSession(String ssoId, Session session) {
   
  -        if (container.getLogger().isDebugEnabled())
  -            container.getLogger().debug("Removing session " + 
session.toString() + " from sso id " + 
  +        if (containerLog.isDebugEnabled())
  +            containerLog.debug("Removing session " + session.toString() + " 
from sso id " + 
                   ssoId );
   
           // Get a reference to the SingleSignOn
  
  
  
  1.15      +21 -21    
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/DataSourceRealm.java
  
  Index: DataSourceRealm.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/DataSourceRealm.java,v
  retrieving revision 1.14
  retrieving revision 1.15
  diff -u -r1.14 -r1.15
  --- DataSourceRealm.java      18 Feb 2005 23:43:20 -0000      1.14
  +++ DataSourceRealm.java      23 Feb 2005 19:27:56 -0000      1.15
  @@ -290,7 +290,7 @@
               
           } catch (SQLException e) {
               // Log the problem for posterity
  -            
container.getLogger().error(sm.getString("dataSourceRealm.exception"), e);
  +            containerLog.error(sm.getString("dataSourceRealm.exception"), e);
   
               // Return "not authenticated" for this request
               return (null);
  @@ -332,12 +332,14 @@
               validated = (digest(credentials).equals(dbCredentials));
   
           if (validated) {
  -            if (container.getLogger().isTraceEnabled())
  -                
container.getLogger().trace(sm.getString("dataSourceRealm.authenticateSuccess",
  +            if (containerLog.isTraceEnabled())
  +                containerLog.trace(
  +                    sm.getString("dataSourceRealm.authenticateSuccess",
                                    username));
           } else {
  -            if (container.getLogger().isTraceEnabled())
  -                
container.getLogger().trace(sm.getString("dataSourceRealm.authenticateFailure",
  +            if (containerLog.isTraceEnabled())
  +                containerLog.trace(
  +                    sm.getString("dataSourceRealm.authenticateFailure",
                                    username));
               return (null);
           }
  @@ -368,7 +370,7 @@
                }
               dbConnection.close();
           } catch (SQLException e) {
  -            
container.getLogger().error(sm.getString("dataSourceRealm.close"), e); // Just 
log it here
  +            containerLog.error(sm.getString("dataSourceRealm.close"), e); // 
Just log it here
           }
   
       }
  @@ -394,7 +396,7 @@
            return dataSource.getConnection();
           } catch (Exception e) {
               // Log the problem for posterity
  -            
container.getLogger().error(sm.getString("dataSourceRealm.exception"), e);
  +            containerLog.error(sm.getString("dataSourceRealm.exception"), e);
           }  
           return null;
       }
  @@ -450,9 +452,9 @@
               return (dbCredentials != null) ? dbCredentials.trim() : null;
               
           } catch(SQLException e) {
  -             container.getLogger().error(sm
  -                     .getString("dataSourceRealm.getPassword.exception",
  -                                        username));
  +            containerLog.error(
  +                    sm.getString("dataSourceRealm.getPassword.exception",
  +                                 username));
           } finally {
                try {
                    if (rs != null) {
  @@ -462,9 +464,9 @@
                        stmt.close();
                    }
                } catch (SQLException e) {
  -             container.getLogger().error(sm
  -                        .getString("dataSourceRealm.getPassword.exception",
  -                                        username));
  +                    containerLog.error(
  +                        sm.getString("dataSourceRealm.getPassword.exception",
  +                                  username));
                        
                }
           }
  @@ -538,9 +540,8 @@
                }
                return list;
        } catch(SQLException e) {
  -             container.getLogger().error(sm
  -                     .getString("dataSourceRealm.getRoles.exception",
  -                                        username));
  +            containerLog.error(
  +                sm.getString("dataSourceRealm.getRoles.exception", 
username));
           }
        finally {
                try {
  @@ -551,10 +552,9 @@
                        stmt.close();
                    }
                } catch (SQLException e) {
  -             container.getLogger().error(sm
  -                        .getString("dataSourceRealm.getRoles.exception",
  -                                        username));
  -                     
  +                    containerLog.error(
  +                        sm.getString("dataSourceRealm.getRoles.exception",
  +                                     username));
                }
           }
        
  
  
  
  1.13      +21 -24    
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/JDBCRealm.java
  
  Index: JDBCRealm.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/JDBCRealm.java,v
  retrieving revision 1.12
  retrieving revision 1.13
  diff -u -r1.12 -r1.13
  --- JDBCRealm.java    18 Feb 2005 23:43:20 -0000      1.12
  +++ JDBCRealm.java    23 Feb 2005 19:27:56 -0000      1.13
  @@ -354,7 +354,7 @@
               } catch (SQLException e) {
   
                   // Log the problem for posterity
  -                
container.getLogger().error(sm.getString("jdbcRealm.exception"), e);
  +                containerLog.error(sm.getString("jdbcRealm.exception"), e);
   
                   // Close the connection so that it gets reopened next time
                   if (dbConnection != null)
  @@ -408,13 +408,13 @@
           }
   
           if (validated) {
  -            if (container.getLogger().isTraceEnabled())
  -                
container.getLogger().trace(sm.getString("jdbcRealm.authenticateSuccess",
  -                                 username));
  +            if (containerLog.isTraceEnabled())
  +                
containerLog.trace(sm.getString("jdbcRealm.authenticateSuccess",
  +                                                username));
           } else {
  -            if (container.getLogger().isTraceEnabled())
  -                
container.getLogger().trace(sm.getString("jdbcRealm.authenticateFailure",
  -                                 username));
  +            if (containerLog.isTraceEnabled())
  +                
containerLog.trace(sm.getString("jdbcRealm.authenticateFailure",
  +                                                username));
               return (null);
           }
   
  @@ -458,7 +458,7 @@
           try {
               dbConnection.close();
           } catch (SQLException e) {
  -            container.getLogger().warn(sm.getString("jdbcRealm.close"), e); 
// Just log it here
  +            containerLog.warn(sm.getString("jdbcRealm.close"), e); // Just 
log it here
           } finally {
              this.dbConnection = null;
           }
  @@ -538,23 +538,22 @@
               return dbCredentials;
               
           } catch(SQLException e){
  -            container.getLogger().
  -                    error(sm.getString("jdbcRealm.getPassword.exception",
  -                                       username), e);
  +            
containerLog.error(sm.getString("jdbcRealm.getPassword.exception",
  +                                            username),
  +                               e);
           } finally {
               if (rs!=null) {
                   try {
                       rs.close();
                   } catch(SQLException e) {
  -                    
container.getLogger().warn(sm.getString("jdbcRealm.abnormalCloseResultSet"));
  +                    
containerLog.warn(sm.getString("jdbcRealm.abnormalCloseResultSet"));
                   }
               }
               try {
                   dbConnection.commit();
               } catch (SQLException e) {
  -                container.getLogger().
  -                        warn(sm.getString("jdbcRealm.getPassword.exception",
  -                                          username));
  +                
containerLog.warn(sm.getString("jdbcRealm.getPassword.exception",
  +                                               username));
               }
           }
           
  @@ -600,23 +599,21 @@
               return (roleList);
               
           } catch(SQLException e){
  -            container.getLogger().
  -                    error(sm.getString("jdbcRealm.getRoles.exception",
  -                                       username));
  +            containerLog.error(sm.getString("jdbcRealm.getRoles.exception",
  +                                            username));
           } finally {
               if (rs!=null) {
                   try {
                       rs.close();
                   } catch(SQLException e) {
  -                    
container.getLogger().warn(sm.getString("jdbcRealm.abnormalCloseResultSet"));
  +                    
containerLog.warn(sm.getString("jdbcRealm.abnormalCloseResultSet"));
                   }
               }
               try {
                   dbConnection.commit();
               } catch (SQLException e) {
  -                container.getLogger().
  -                        warn(sm.getString("jdbcRealm.getRoles.exception",
  -                                          username));
  +                
containerLog.warn(sm.getString("jdbcRealm.getRoles.exception",
  +                                               username));
               }
           }
   
  @@ -719,7 +716,7 @@
           try {
               open();
           } catch (SQLException e) {
  -            container.getLogger().error(sm.getString("jdbcRealm.open"), e);
  +            containerLog.error(sm.getString("jdbcRealm.open"), e);
           }
   
           // Perform normal superclass initialization
  
  
  
  1.20      +36 -41    
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/JNDIRealm.java
  
  Index: JNDIRealm.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/JNDIRealm.java,v
  retrieving revision 1.19
  retrieving revision 1.20
  diff -u -r1.19 -r1.20
  --- JNDIRealm.java    18 Feb 2005 23:43:20 -0000      1.19
  +++ JNDIRealm.java    23 Feb 2005 19:27:56 -0000      1.20
  @@ -14,12 +14,8 @@
    * limitations under the License.
    */
   
  -
  -
  -
   package org.apache.catalina.realm;
   
  -
   import java.security.Principal;
   import java.text.MessageFormat;
   import java.util.ArrayList;
  @@ -45,7 +41,6 @@
   import org.apache.catalina.LifecycleException;
   import org.apache.catalina.util.Base64;
   
  -
   /**
    * <p>Implementation of <strong>Realm</strong> that works with a directory
    * server accessed via the Java Naming and Directory Interface (JNDI) APIs.
  @@ -819,7 +814,7 @@
                       throw(e);
   
                   // log the exception so we know it's there.
  -                
container.getLogger().error(sm.getString("jndiRealm.exception"), e);
  +                containerLog.error(sm.getString("jndiRealm.exception"), e);
   
                   // close the connection so we know it will be reopened.
                   if (context != null)
  @@ -843,7 +838,7 @@
           } catch (NamingException e) {
   
               // Log the problem for posterity
  -            container.getLogger().error(sm.getString("jndiRealm.exception"), 
e);
  +            containerLog.error(sm.getString("jndiRealm.exception"), e);
   
               // Close the connection so that it gets reopened next time
               if (context != null)
  @@ -902,7 +897,7 @@
                           }
                       } catch (InvalidNameException ine) {
                           // Log the problem for posterity
  -                        
container.getLogger().warn(sm.getString("jndiRealm.exception"), ine);
  +                        
containerLog.warn(sm.getString("jndiRealm.exception"), ine);
                           // ignore; this is probably due to a name not fitting
                           // the search path format exactly, as in a fully-
                           // qualified name being munged into a search path
  @@ -1074,7 +1069,7 @@
   
           // Check no further entries were found
           if (results.hasMore()) {
  -            container.getLogger().info("username " + username + " has 
multiple entries");
  +            containerLog.info("username " + username + " has multiple 
entries");
               return (null);
           }
   
  @@ -1090,8 +1085,8 @@
           name = name.addAll(entryName);
           String dn = name.toString();
   
  -        if (container.getLogger().isTraceEnabled())
  -            container.getLogger().trace("  entry found for " + username + " 
with dn " + dn);
  +        if (containerLog.isTraceEnabled())
  +            containerLog.trace("  entry found for " + username + " with dn " 
+ dn);
   
           // Get the entry's attributes
           Attributes attrs = result.getAttributes();
  @@ -1140,12 +1135,12 @@
                validated = compareCredentials(context, user, credentials);
            }
   
  -         if (container.getLogger().isTraceEnabled()) {
  +         if (containerLog.isTraceEnabled()) {
                if (validated) {
  -                 
container.getLogger().trace(sm.getString("jndiRealm.authenticateSuccess",
  +                 
containerLog.trace(sm.getString("jndiRealm.authenticateSuccess",
                                     user.username));
                } else {
  -                 
container.getLogger().trace(sm.getString("jndiRealm.authenticateFailure",
  +                 
containerLog.trace(sm.getString("jndiRealm.authenticateFailure",
                                     user.username));
                }
            }
  @@ -1177,8 +1172,8 @@
               return (false);
   
           // Validate the credentials specified by the user
  -        if (container.getLogger().isTraceEnabled())
  -            container.getLogger().trace("  validating credentials");
  +        if (containerLog.isTraceEnabled())
  +            containerLog.trace("  validating credentials");
   
           boolean validated = false;
           if (hasMessageDigest()) {
  @@ -1230,8 +1225,8 @@
                return (false);
   
            // Validate the credentials specified by the user
  -         if (container.getLogger().isTraceEnabled()) {
  -             container.getLogger().trace("  validating credentials by 
binding as the user");
  +         if (containerLog.isTraceEnabled()) {
  +             containerLog.trace("  validating credentials by binding as the 
user");
           }
   
           // Set up security environment to bind as the user
  @@ -1241,15 +1236,15 @@
           // Elicit an LDAP bind operation
           boolean validated = false;
           try {
  -            if (container.getLogger().isTraceEnabled()) {
  -                container.getLogger().trace("  binding as "  + dn);
  +            if (containerLog.isTraceEnabled()) {
  +                containerLog.trace("  binding as "  + dn);
               }
               attr = context.getAttributes("", null);
               validated = true;
           }
           catch (AuthenticationException e) {
  -            if (container.getLogger().isTraceEnabled()) {
  -                container.getLogger().trace("  bind attempt failed");
  +            if (containerLog.isTraceEnabled()) {
  +                containerLog.trace("  bind attempt failed");
               }
           }
   
  @@ -1296,8 +1291,8 @@
           if (dn == null || username == null)
               return (null);
   
  -        if (container.getLogger().isTraceEnabled())
  -            container.getLogger().trace("  getRoles(" + dn + ")");
  +        if (containerLog.isTraceEnabled())
  +            containerLog.trace("  getRoles(" + dn + ")");
   
           // Start with roles retrieved from the user entry
           ArrayList list = user.roles;
  @@ -1332,13 +1327,13 @@
           }
   
   
  -        if (container.getLogger().isTraceEnabled()) {
  +        if (containerLog.isTraceEnabled()) {
               if (list != null) {
  -                container.getLogger().trace("  Returning " + list.size() + " 
roles");
  +                containerLog.trace("  Returning " + list.size() + " roles");
                   for (int i=0; i<list.size(); i++)
  -                    container.getLogger().trace(  "  Found role " + 
list.get(i));
  +                    containerLog.trace(  "  Found role " + list.get(i));
               } else {
  -                container.getLogger().trace("  getRoles about to return null 
");
  +                containerLog.trace("  getRoles about to return null ");
               }
           }
   
  @@ -1357,8 +1352,8 @@
       private String getAttributeValue(String attrId, Attributes attrs)
           throws NamingException {
   
  -        if (container.getLogger().isTraceEnabled())
  -            container.getLogger().trace("  retrieving attribute " + attrId);
  +        if (containerLog.isTraceEnabled())
  +            containerLog.trace("  retrieving attribute " + attrId);
   
           if (attrId == null || attrs == null)
               return null;
  @@ -1394,8 +1389,8 @@
                                            ArrayList values)
           throws NamingException{
   
  -        if (container.getLogger().isTraceEnabled())
  -            container.getLogger().trace("  retrieving values for attribute " 
+ attrId);
  +        if (containerLog.isTraceEnabled())
  +            containerLog.trace("  retrieving values for attribute " + 
attrId);
           if (attrId == null || attrs == null)
               return values;
           if (values == null)
  @@ -1425,11 +1420,11 @@
   
           // Close our opened connection
           try {
  -            if (container.getLogger().isDebugEnabled())
  -                container.getLogger().debug("Closing directory context");
  +            if (containerLog.isDebugEnabled())
  +                containerLog.debug("Closing directory context");
               context.close();
           } catch (NamingException e) {
  -            container.getLogger().error(sm.getString("jndiRealm.close"), e);
  +            containerLog.error(sm.getString("jndiRealm.close"), e);
           }
           this.context = null;
   
  @@ -1489,7 +1484,7 @@
               connectionAttempt = 1;
   
               // log the first exception.
  -            container.getLogger().warn(sm.getString("jndiRealm.exception"), 
e);
  +            containerLog.warn(sm.getString("jndiRealm.exception"), e);
   
               // Try connecting to the alternate url.
               context = new 
InitialDirContext(getDirectoryContextEnvironment());
  @@ -1516,10 +1511,10 @@
           Hashtable env = new Hashtable();
   
           // Configure our directory context environment.
  -        if (container.getLogger().isDebugEnabled() && connectionAttempt == 0)
  -            container.getLogger().debug("Connecting to URL " + 
connectionURL);
  -        else if (container.getLogger().isDebugEnabled() && connectionAttempt 
> 0)
  -            container.getLogger().debug("Connecting to URL " + alternateURL);
  +        if (containerLog.isDebugEnabled() && connectionAttempt == 0)
  +            containerLog.debug("Connecting to URL " + connectionURL);
  +        else if (containerLog.isDebugEnabled() && connectionAttempt > 0)
  +            containerLog.debug("Connecting to URL " + alternateURL);
           env.put(Context.INITIAL_CONTEXT_FACTORY, contextFactory);
           if (connectionName != null)
               env.put(Context.SECURITY_PRINCIPAL, connectionName);
  
  
  
  1.48      +14 -9     
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/RealmBase.java
  
  Index: RealmBase.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/RealmBase.java,v
  retrieving revision 1.47
  retrieving revision 1.48
  diff -u -r1.47 -r1.48
  --- RealmBase.java    18 Feb 2005 23:43:20 -0000      1.47
  +++ RealmBase.java    23 Feb 2005 19:27:56 -0000      1.48
  @@ -78,6 +78,12 @@
   
   
       /**
  +     * Container log
  +     */
  +    protected Log containerLog = null;
  +
  +
  +    /**
        * Digest algorithm used in storing passwords in a non-plaintext format.
        * Valid values are those accepted for the algorithm name by the
        * MessageDigest class, or <code>null</code> if no digesting should
  @@ -169,6 +175,7 @@
   
           Container oldContainer = this.container;
           this.container = container;
  +        this.containerLog = container.getLogger();
           support.firePropertyChange("container", oldContainer, 
this.container);
   
       }
  @@ -283,17 +290,15 @@
               validated = serverCredentials.equals(credentials);
           }
           if(! validated ) {
  -            if (container.getLogger().isTraceEnabled()) {
  -                container.getLogger().
  -                    trace(sm.getString("realmBase.authenticateFailure",
  -                                 username));
  +            if (containerLog.isTraceEnabled()) {
  +                
containerLog.trace(sm.getString("realmBase.authenticateFailure",
  +                                                username));
               }
               return null;
           }
  -        if (container.getLogger().isTraceEnabled()) {
  -            container.getLogger().
  -                trace(sm.getString("realmBase.authenticateSuccess",
  -                             username));
  +        if (containerLog.isTraceEnabled()) {
  +            containerLog.trace(sm.getString("realmBase.authenticateSuccess",
  +                                            username));
           }
   
           return getPrincipal(username);
  
  
  
  1.12      +4 -2      
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/UserDatabaseRealm.java
  
  Index: UserDatabaseRealm.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/realm/UserDatabaseRealm.java,v
  retrieving revision 1.11
  retrieving revision 1.12
  diff -u -r1.11 -r1.12
  --- UserDatabaseRealm.java    18 Feb 2005 23:43:20 -0000      1.11
  +++ UserDatabaseRealm.java    23 Feb 2005 19:27:56 -0000      1.12
  @@ -221,7 +221,9 @@
               Context context = server.getGlobalNamingContext();
               database = (UserDatabase) context.lookup(resourceName);
           } catch (Throwable e) {
  -            
container.getLogger().error(sm.getString("userDatabaseRealm.lookup", 
resourceName), e);
  +            containerLog.error(sm.getString("userDatabaseRealm.lookup",
  +                                            resourceName),
  +                               e);
               database = null;
           }
           if (database == null) {
  
  
  
  1.17      +8 -2      
jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves/ValveBase.java
  
  Index: ValveBase.java
  ===================================================================
  RCS file: 
/home/cvs/jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/valves/ValveBase.java,v
  retrieving revision 1.16
  retrieving revision 1.17
  diff -u -r1.16 -r1.17
  --- ValveBase.java    5 Oct 2004 17:12:49 -0000       1.16
  +++ ValveBase.java    23 Feb 2005 19:27:56 -0000      1.17
  @@ -67,6 +67,12 @@
   
   
       /**
  +     * Container log
  +     */
  +    protected Log containerLog = null;
  +
  +
  +    /**
        * Descriptive information about this Valve implementation.  This value
        * should be overridden by subclasses.
        */
  @@ -108,7 +114,7 @@
       public void setContainer(Container container) {
   
           this.container = container;
  -
  +        this.containerLog = container.getLogger();
       }
   
   
  
  
  

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to