This is an automated email from the ASF dual-hosted git repository. markt pushed a commit to branch 7.0.x in repository https://gitbox.apache.org/repos/asf/tomcat.git
commit c085d3721bdfc3798300d6ff9d96a5df6465940a Author: Mark Thomas <ma...@apache.org> AuthorDate: Mon Dec 2 20:30:33 2019 +0000 Remove leading spaces from debug messages --- .../catalina/authenticator/AuthenticatorBase.java | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/java/org/apache/catalina/authenticator/AuthenticatorBase.java b/java/org/apache/catalina/authenticator/AuthenticatorBase.java index 485b2f4..6c9e121 100644 --- a/java/org/apache/catalina/authenticator/AuthenticatorBase.java +++ b/java/org/apache/catalina/authenticator/AuthenticatorBase.java @@ -488,7 +488,7 @@ public abstract class AuthenticatorBase extends ValveBase if (constraints == null && !context.getPreemptiveAuthentication() && !authRequired) { if (log.isDebugEnabled()) { - log.debug(" Not subject to any constraint"); + log.debug("Not subject to any constraint"); } getNext().invoke(request, response); return; @@ -511,11 +511,11 @@ public abstract class AuthenticatorBase extends ValveBase if (constraints != null) { // Enforce any user data constraint for this security constraint if (log.isDebugEnabled()) { - log.debug(" Calling hasUserDataPermission()"); + log.debug("Calling hasUserDataPermission()"); } if (!realm.hasUserDataPermission(request, response, constraints)) { if (log.isDebugEnabled()) { - log.debug(" Failed hasUserDataPermission() test"); + log.debug("Failed hasUserDataPermission() test"); } /* * ASSERT: Authenticator already set the appropriate HTTP status @@ -559,7 +559,7 @@ public abstract class AuthenticatorBase extends ValveBase if ((authRequired || constraints != null) && allowCorsPreflightBypass(request)) { if (log.isDebugEnabled()) { - log.debug(" CORS Preflight request bypassing authentication"); + log.debug("CORS Preflight request bypassing authentication"); } getNext().invoke(request, response); return; @@ -567,11 +567,11 @@ public abstract class AuthenticatorBase extends ValveBase if (authRequired) { if (log.isDebugEnabled()) { - log.debug(" Calling authenticate()"); + log.debug("Calling authenticate()"); } if (!authenticate(request, response, config)) { if (log.isDebugEnabled()) { - log.debug(" Failed authenticate() test"); + log.debug("Failed authenticate() test"); } /* * ASSERT: Authenticator already set the appropriate HTTP status @@ -584,11 +584,11 @@ public abstract class AuthenticatorBase extends ValveBase if (constraints != null) { if (log.isDebugEnabled()) { - log.debug(" Calling accessControl()"); + log.debug("Calling accessControl()"); } if (!realm.hasResourcePermission(request, response, constraints, this.context)) { if (log.isDebugEnabled()) { - log.debug(" Failed accessControl() test"); + log.debug("Failed accessControl() test"); } /* * ASSERT: AccessControl method has already set the appropriate @@ -600,7 +600,7 @@ public abstract class AuthenticatorBase extends ValveBase // Any and all specified constraints have been satisfied if (log.isDebugEnabled()) { - log.debug(" Successfully passed all security constraints"); + log.debug("Successfully passed all security constraints"); } getNext().invoke(request, response); @@ -856,7 +856,7 @@ public abstract class AuthenticatorBase extends ValveBase associate(ssoId, request.getSessionInternal(true)); if (log.isDebugEnabled()) { - log.debug(" Reauthenticated cached principal '" + + log.debug("Reauthenticated cached principal '" + request.getUserPrincipal().getName() + "' with auth type '" + request.getAuthType() + "'"); } --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org