This is an automated email from the ASF dual-hosted git repository. markt pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/tomcat.git
commit 17e9bda849f1e741f846d6af53e6405ce09be175 Author: Mark Thomas <ma...@apache.org> AuthorDate: Mon Dec 2 20:30:33 2019 +0000 Remove leading spaces from debug messages --- .../catalina/authenticator/AuthenticatorBase.java | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/java/org/apache/catalina/authenticator/AuthenticatorBase.java b/java/org/apache/catalina/authenticator/AuthenticatorBase.java index 610f15b..b6f2c9e 100644 --- a/java/org/apache/catalina/authenticator/AuthenticatorBase.java +++ b/java/org/apache/catalina/authenticator/AuthenticatorBase.java @@ -537,7 +537,7 @@ public abstract class AuthenticatorBase extends ValveBase if (constraints == null && !context.getPreemptiveAuthentication() && !authRequired) { if (log.isDebugEnabled()) { - log.debug(" Not subject to any constraint"); + log.debug("Not subject to any constraint"); } getNext().invoke(request, response); return; @@ -560,11 +560,11 @@ public abstract class AuthenticatorBase extends ValveBase if (constraints != null) { // Enforce any user data constraint for this security constraint if (log.isDebugEnabled()) { - log.debug(" Calling hasUserDataPermission()"); + log.debug("Calling hasUserDataPermission()"); } if (!realm.hasUserDataPermission(request, response, constraints)) { if (log.isDebugEnabled()) { - log.debug(" Failed hasUserDataPermission() test"); + log.debug("Failed hasUserDataPermission() test"); } /* * ASSERT: Authenticator already set the appropriate HTTP status @@ -611,7 +611,7 @@ public abstract class AuthenticatorBase extends ValveBase if ((authRequired || constraints != null) && allowCorsPreflightBypass(request)) { if (log.isDebugEnabled()) { - log.debug(" CORS Preflight request bypassing authentication"); + log.debug("CORS Preflight request bypassing authentication"); } getNext().invoke(request, response); return; @@ -619,7 +619,7 @@ public abstract class AuthenticatorBase extends ValveBase if (authRequired) { if (log.isDebugEnabled()) { - log.debug(" Calling authenticate()"); + log.debug("Calling authenticate()"); } if (jaspicProvider != null) { @@ -633,7 +633,7 @@ public abstract class AuthenticatorBase extends ValveBase jaspicProvider != null && !authenticateJaspic(request, response, jaspicState, false)) { if (log.isDebugEnabled()) { - log.debug(" Failed authenticate() test"); + log.debug("Failed authenticate() test"); } /* * ASSERT: Authenticator already set the appropriate HTTP status @@ -646,11 +646,11 @@ public abstract class AuthenticatorBase extends ValveBase if (constraints != null) { if (log.isDebugEnabled()) { - log.debug(" Calling accessControl()"); + log.debug("Calling accessControl()"); } if (!realm.hasResourcePermission(request, response, constraints, this.context)) { if (log.isDebugEnabled()) { - log.debug(" Failed accessControl() test"); + log.debug("Failed accessControl() test"); } /* * ASSERT: AccessControl method has already set the appropriate @@ -662,7 +662,7 @@ public abstract class AuthenticatorBase extends ValveBase // Any and all specified constraints have been satisfied if (log.isDebugEnabled()) { - log.debug(" Successfully passed all security constraints"); + log.debug("Successfully passed all security constraints"); } getNext().invoke(request, response); @@ -1068,7 +1068,7 @@ public abstract class AuthenticatorBase extends ValveBase associate(ssoId, request.getSessionInternal(true)); if (log.isDebugEnabled()) { - log.debug(" Reauthenticated cached principal '" + + log.debug("Reauthenticated cached principal '" + request.getUserPrincipal().getName() + "' with auth type '" + request.getAuthType() + "'"); } --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org