diff --git a/src/mod_auth_pubtkt.c b/src/mod_auth_pubtkt.c index 2c51258..a42a2be 100755 --- a/src/mod_auth_pubtkt.c +++ b/src/mod_auth_pubtkt.c @@ -768,16 +768,12 @@ static int auth_pubtkt_check(request_rec *r) { dump_config(r); - fprintf(stderr,"a\n"); if (!current_auth || strcasecmp(current_auth, MOD_AUTH_PUBTKT_AUTH_TYPE)) { return DECLINED; } - - fprintf(stderr,"one\n"); /* Module misconfigured unless login_url is set */ if (!conf->login_url) { - fprintf(stderr,"err0\n"); ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_SUCCESS, r, "TKT: TKTAuthLoginURL missing"); return HTTP_INTERNAL_SERVER_ERROR; @@ -785,7 +781,6 @@ static int auth_pubtkt_check(request_rec *r) { /* Module misconfigured unless public key set */ if (!sconf->pubkey) { - fprintf(stderr,"err1\n"); ap_log_rerror(APLOG_MARK, APLOG_ERR, APR_SUCCESS, r, "TKT: TKTAuthPublicKey missing"); return HTTP_INTERNAL_SERVER_ERROR; @@ -793,7 +788,6 @@ static int auth_pubtkt_check(request_rec *r) { /* Redirect/login if scheme not "https" and require_ssl is set */ if (conf->require_ssl > 0 && strcmp(scheme, "https") != 0) { - fprintf(stderr,"err2\n"); ap_log_rerror(APLOG_MARK, APLOG_WARNING, APR_SUCCESS, r, "TKT: redirect/login - unsecured request, TKTAuthRequireSSL is on"); return redirect(r, conf->login_url); @@ -802,7 +796,6 @@ static int auth_pubtkt_check(request_rec *r) { /* Check for ticket cookie */ ticket = get_cookie_ticket(r); if (ticket == NULL) { - fprintf(stderr,"err3\n"); ap_log_rerror(APLOG_MARK, APLOG_INFO, APR_SUCCESS, r, "TKT: no ticket found - redirecting to login URL"); return redirect(r, conf->login_url); @@ -812,7 +805,6 @@ static int auth_pubtkt_check(request_rec *r) { parsed = validate_parse_ticket(r, ticket); if (parsed == NULL) { - fprintf(stderr,"err4\n"); ap_log_rerror(APLOG_MARK, APLOG_INFO, APR_SUCCESS, r, "TKT: invalid ticket found - redirecting to login URL"); return redirect(r, conf->login_url); @@ -827,8 +819,6 @@ static int auth_pubtkt_check(request_rec *r) { return redirect(r, conf->login_url); } - fprintf(stderr,"c\n"); - /* Valid ticket, check timeout - redirect/timed-out if so */ if (!check_timeout(r, parsed)) { ap_log_rerror(APLOG_MARK, APLOG_INFO, APR_SUCCESS, r, @@ -843,14 +833,11 @@ static int auth_pubtkt_check(request_rec *r) { return redirect(r, url); } - fprintf(stderr,"d\n"); - ap_log_rerror(APLOG_MARK, APLOG_INFO, APR_SUCCESS, r, "TKT: TWO"); /* Attempt to refresh cookie if it will expires - redirect on get if so */ if ( !check_grace_period(r, parsed) && strcmp(r->method, "GET") == 0 ) { - fprintf(stderr,"fack1\n"); ap_log_rerror(APLOG_MARK, APLOG_INFO, APR_SUCCESS, r, "TKT: ticket grace period - redirecting to refresh URL"); return redirect(r, (conf->refresh_url ? conf->refresh_url : conf->login_url)); @@ -858,7 +845,6 @@ static int auth_pubtkt_check(request_rec *r) { /* Check tokens - redirect/unauthorised if so */ if (!check_tokens(r, parsed)) { - fprintf(stderr,"fack2\n"); return redirect(r, conf->unauth_url ? conf->unauth_url : conf->login_url); }