}
if (amRunningAsRoot()) {
- LOG_WARN(dhcp4_logger, DHCP4_ROOT_USER_SECURITY_WARN);
+ LOG_WARN(dhcp4_logger, DHCP4_ROOT_USER_SECURITY_WARNING);
}
if (!PathChecker::shouldEnforceSecurity()) {
}
if (amRunningAsRoot()) {
- LOG_WARN(dhcp6_logger, DHCP6_ROOT_USER_SECURITY_WARN);
+ LOG_WARN(dhcp6_logger, DHCP6_ROOT_USER_SECURITY_WARNING);
}
if (!PathChecker::shouldEnforceSecurity()) {
try {
filename = CfgMgr::instance().validatePath(file->stringValue());
} catch (const SecurityWarn& ex) {
- LOG_WARN(lease_cmds_logger, LEASE_CMDS_PATH_SECURITY_WARN)
+ LOG_WARN(lease_cmds_logger, LEASE_CMDS_PATH_SECURITY_WARNING)
.arg(ex.what());
filename = file->stringValue();
} catch (const std::exception& ex) {
"}";
std::ostringstream os;
- os << "LEASE_CMDS_PATH_SECURITY_WARN lease file path specified is NOT SECURE:"
+ os << "LEASE_CMDS_PATH_SECURITY_WARNING lease file path specified is NOT SECURE:"
<< " invalid path specified: '/tmp', supported path is '"
<< CfgMgr::instance().getDataDir() << "'";
std::ostringstream oss;
config->toJSON(oss);
- LOG_WARN(command_logger, COMMAND_HTTP_SOCKET_SECURITY_WARN)
+ LOG_WARN(command_logger, COMMAND_HTTP_SOCKET_SECURITY_WARNING)
.arg(oss.str());
}
DhcpConfigError, "Unsecured HTTP control channel (:0:0)");
// Turn off security enforcment. Configuration will succeed but we
- // should see WARN logs.
+ // should see WARNING logs.
file::PathChecker::enableEnforcement(false);
ASSERT_NO_THROW_LOG(http_config_.reset(new HttpCommandConfig(json)));
)";
runToElementTest(expected, *http_config_);
- ASSERT_EQ(1, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARN command socket"
+ ASSERT_EQ(1, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARNING command socket"
" configuration is NOT SECURE: { }"));
// Change class defaults.
EXPECT_EQ("::1", http_config_->getSocketAddress().toText());
EXPECT_EQ(8080, http_config_->getSocketPort());
- ASSERT_EQ(2, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARN command socket"
+ ASSERT_EQ(2, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARNING command socket"
" configuration is NOT SECURE: { }"));
}
})";
runToElementTest(expected, *http_config_);
- // Should have security WARN log.
- ASSERT_EQ(1, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARN command socket"
+ // Should have security WARNING log.
+ ASSERT_EQ(1, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARNING command socket"
" configuration is NOT SECURE: { \"http-headers\": "
"[ { \"name\": \"Strict-Transport-Security\", \"value\":"
" \"max-age=31536000\" }, { \"name\": \"Foo\", \"value\": \"bar\""
runToElementTest(expected, *http_config_);
// Should be no security warnings.
- ASSERT_EQ(0, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARN"));
+ ASSERT_EQ(0, countFile("COMMAND_HTTP_SOCKET_SECURITY_WARNING"));
}
// This test verifies a HTTP control socket configuration with TLS can
<< " (" << getPosition("secret", key_config)
<< ")");
} else {
- LOG_WARN(dhcp_to_d2_logger, DHCP_DDNS_TSIG_SECRET_SECURITY_WARN)
+ LOG_WARN(dhcp_to_d2_logger, DHCP_DDNS_TSIG_SECRET_SECURITY_WARNING)
.arg(getPosition("secret", key_config).str());
}
}
isc_throw(DhcpConfigError, "use of clear text 'password' is NOT SECURE ("
<< password_cfg->getPosition() << ")");
} else {
- LOG_INFO(auth_logger, HTTP_CLIENT_PASSWORD_SECURITY_WARN)
+ LOG_INFO(auth_logger, HTTP_CLIENT_PASSWORD_SECURITY_WARNING)
.arg(password_cfg->getPosition().str());
}
}
isc_throw(DhcpConfigError, "use of clear text 'user' is NOT SECURE ("
<< user_cfg->getPosition() << ")");
} else {
- LOG_INFO(auth_logger, HTTP_CLIENT_USER_SECURITY_WARN)
+ LOG_INFO(auth_logger, HTTP_CLIENT_USER_SECURITY_WARNING)
.arg(user_cfg->getPosition().str());
}
}
EXPECT_NO_THROW(config.parse(cfg));
runToElementTest<BasicHttpAuthConfig>(cfg, config);
- EXPECT_EQ(4, countFile("HTTP_CLIENT_PASSWORD_SECURITY_WARN"
+ EXPECT_EQ(4, countFile("HTTP_CLIENT_PASSWORD_SECURITY_WARNING"
" use of clear text 'password' is NOT SECURE: :0:0"));
}
// Disable security.
file::PathChecker::enableEnforcement(false);
ASSERT_NO_THROW_LOG(auth.parse(config));
- EXPECT_EQ(1, countFile("HTTP_CLIENT_USER_SECURITY_WARN "
+ EXPECT_EQ(1, countFile("HTTP_CLIENT_USER_SECURITY_WARNING "
"use of clear text 'user' is NOT SECURE: <string>:6:21"));
}
// Disable security.
file::PathChecker::enableEnforcement(false);
ASSERT_NO_THROW_LOG(auth.parse(config));
- EXPECT_EQ(1, countFile("HTTP_CLIENT_PASSWORD_SECURITY_WARN "
+ EXPECT_EQ(1, countFile("HTTP_CLIENT_PASSWORD_SECURITY_WARNING "
"use of clear text 'password' is NOT SECURE: <string>:7:25"));
- EXPECT_EQ(1, countFile("HTTP_CLIENT_USER_SECURITY_WARN "
+ EXPECT_EQ(1, countFile("HTTP_CLIENT_USER_SECURITY_WARNING "
"use of clear text 'user' is NOT SECURE: <string>:6:21"));
}
}
if (file::amRunningAsRoot()) {
- LOG_WARN(dctl_logger, DCTL_ROOT_USER_SECURITY_WARN)
+ LOG_WARN(dctl_logger, DCTL_ROOT_USER_SECURITY_WARNING)
.arg(app_name_);
}