Index: lams_build/conf/unix/jboss/log4j.xml =================================================================== diff -u -r6baaf874bfc8fafcc6dc20fc066bbfc845eb62bc -r7672b5a92290fadb9863b022124b4f21bf2578a5 --- lams_build/conf/unix/jboss/log4j.xml (.../log4j.xml) (revision 6baaf874bfc8fafcc6dc20fc066bbfc845eb62bc) +++ lams_build/conf/unix/jboss/log4j.xml (.../log4j.xml) (revision 7672b5a92290fadb9863b022124b4f21bf2578a5) @@ -195,6 +195,12 @@ + + + + + + Index: lams_build/conf/windows/jboss/log4j.xml =================================================================== diff -u -r6baaf874bfc8fafcc6dc20fc066bbfc845eb62bc -r7672b5a92290fadb9863b022124b4f21bf2578a5 --- lams_build/conf/windows/jboss/log4j.xml (.../log4j.xml) (revision 6baaf874bfc8fafcc6dc20fc066bbfc845eb62bc) +++ lams_build/conf/windows/jboss/log4j.xml (.../log4j.xml) (revision 7672b5a92290fadb9863b022124b4f21bf2578a5) @@ -195,6 +195,12 @@ + + + + + + Index: lams_common/src/java/org/lamsfoundation/lams/integration/security/SingleSignOn.java =================================================================== diff -u -r560f582867ff02d1a45a7e85cefe43319337dc91 -r7672b5a92290fadb9863b022124b4f21bf2578a5 --- lams_common/src/java/org/lamsfoundation/lams/integration/security/SingleSignOn.java (.../SingleSignOn.java) (revision 560f582867ff02d1a45a7e85cefe43319337dc91) +++ lams_common/src/java/org/lamsfoundation/lams/integration/security/SingleSignOn.java (.../SingleSignOn.java) (revision 7672b5a92290fadb9863b022124b4f21bf2578a5) @@ -50,15 +50,15 @@ request.removeNote(Constants.REQ_SSOID_NOTE); // Has a valid user already been authenticated? - if (log.isDebugEnabled()) - log.debug("Process request for '" + request.getRequestURI() + "'"); +// if (log.isDebugEnabled()) +// log.debug("Process request for '" + request.getRequestURI() + "'"); Principal p = request.getUserPrincipal(); String username = null; String password = null; if (request.getUserPrincipal() != null) { - if (log.isDebugEnabled()) - log.debug(" Principal '" + request.getUserPrincipal().getName() - + "' has already been authenticated"); +// if (log.isDebugEnabled()) +// log.debug(" Principal '" + request.getUserPrincipal().getName() +// + "' has already been authenticated"); getNext().invoke(request, response); return; } else { @@ -71,8 +71,8 @@ } // Check for the single sign on cookie - if (log.isDebugEnabled()) - log.debug(" Checking for SSO cookie"); +// if (log.isDebugEnabled()) +// log.debug(" Checking for SSO cookie"); Cookie cookie = null; Cookie cookies[] = request.getCookies(); if (cookies == null) @@ -84,35 +84,35 @@ } } if (cookie == null) { - if (log.isDebugEnabled()) - log.debug(" SSO cookie is not present"); +// if (log.isDebugEnabled()) +// log.debug(" SSO cookie is not present"); getNext().invoke(request, response); return; } // Look up the cached Principal associated with this cookie value - if (log.isDebugEnabled()) - log.debug(" Checking for cached principal for " + cookie.getValue()); +// if (log.isDebugEnabled()) +// log.debug(" Checking for cached principal for " + cookie.getValue()); // register principal from internal session. This principal is set // in internal session by catalina FormAuthenticator if (p != null) { - log.debug("principal - " + p.getName()); +// log.debug("principal - " + p.getName()); register(cookie.getValue(), p, Constants.FORM_METHOD, username, password); } SingleSignOnEntry entry = lookup(cookie.getValue()); if (entry != null) { - if (log.isDebugEnabled()) - log.debug(" Found cached principal '" + entry.getPrincipal().getName() - + "' with auth type '" + entry.getAuthType() + "'"); +// if (log.isDebugEnabled()) +// log.debug(" Found cached principal '" + entry.getPrincipal().getName() +// + "' with auth type '" + entry.getAuthType() + "'"); request.setNote(Constants.REQ_SSOID_NOTE, cookie.getValue()); // Only set security elements if reauthentication is not required if (!getRequireReauthentication()) { request.setAuthType(entry.getAuthType()); request.setUserPrincipal(entry.getPrincipal()); } } else { - if (log.isDebugEnabled()) - log.debug(" No cached principal found, erasing SSO cookie"); +// if (log.isDebugEnabled()) +// log.debug(" No cached principal found, erasing SSO cookie"); cookie.setMaxAge(0); response.addCookie(cookie); } Index: lams_common/src/java/org/lamsfoundation/lams/web/filter/LocaleFilter.java =================================================================== diff -u -rad09c4163bcae7ea249a94278c9d9b9fa93e2fc6 -r7672b5a92290fadb9863b022124b4f21bf2578a5 --- lams_common/src/java/org/lamsfoundation/lams/web/filter/LocaleFilter.java (.../LocaleFilter.java) (revision ad09c4163bcae7ea249a94278c9d9b9fa93e2fc6) +++ lams_common/src/java/org/lamsfoundation/lams/web/filter/LocaleFilter.java (.../LocaleFilter.java) (revision 7672b5a92290fadb9863b022124b4f21bf2578a5) @@ -55,7 +55,7 @@ */ public class LocaleFilter extends OncePerRequestFilter { - private static Logger log = Logger.getLogger(LocaleFilter.class); +// private static Logger log = Logger.getLogger(LocaleFilter.class); private String encoding; public static final String PREFERRED_LOCALE_KEY = "org.apache.struts.action.LOCALE"; @@ -101,12 +101,6 @@ // so we may end up with some confusing situations. if(!StringUtils.isEmpty(lang)){ preferredLocale = new Locale(lang,country!=null?country:""); - - // TODO Added to debug Chinese problem. To be removed. - if ( log.isDebugEnabled() ) { - log.debug("Locale set from user lang/country is "+lang+","+country); - } - } } } @@ -117,11 +111,6 @@ preferredLocale = new Locale(defaults[0]!=null?defaults[0]:"", defaults[1]!=null?defaults[1]:""); - // TODO Added to debug Chinese problem. To be removed. - if ( log.isDebugEnabled() ) { - log.debug("Locale set from server is "+defaults[0]+","+defaults[1]); - } - } if(direction == null){