From 3ca567dd248cc133aa5506884324206501f31cf4 Mon Sep 17 00:00:00 2001 From: Durand Fabrice Date: Mon, 23 Nov 2015 08:49:16 -0500 Subject: [PATCH] Removed useless log --- lib/pf/Switch/AeroHIVE.pm | 4 ++-- lib/pf/Switch/AeroHIVE/AP_http.pm | 2 +- lib/pf/Switch/Cisco/Catalyst_2960_http.pm | 2 +- lib/pf/Switch/Mikrotik.pm | 2 +- lib/pf/Switch/Xirrus/AP_http.pm | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/lib/pf/Switch/AeroHIVE.pm b/lib/pf/Switch/AeroHIVE.pm index dfd1cc98cdce..ce3d72bf6b7c 100644 --- a/lib/pf/Switch/AeroHIVE.pm +++ b/lib/pf/Switch/AeroHIVE.pm @@ -247,7 +247,7 @@ sub returnRadiusAccessAccept { }; } - $logger->info("[$args->{'mac'}] (".$this->{'_id'}.") Returning ACCEPT with Role: $role"); + $logger->info("(".$this->{'_id'}.") Returning ACCEPT with Role: $role"); } @@ -260,7 +260,7 @@ sub returnRadiusAccessAccept { 'Tunnel-Private-Group-ID' => $args->{'vlan'}, }; - $logger->info("[$args->{'mac'}] Returning ACCEPT with VLAN: $args->{'vlan'}"); + $logger->info("Returning ACCEPT with VLAN: $args->{'vlan'}"); } my $filter = pf::access_filter::radius->new; diff --git a/lib/pf/Switch/AeroHIVE/AP_http.pm b/lib/pf/Switch/AeroHIVE/AP_http.pm index 7d6d0c853d4f..3db814b17f2a 100644 --- a/lib/pf/Switch/AeroHIVE/AP_http.pm +++ b/lib/pf/Switch/AeroHIVE/AP_http.pm @@ -86,7 +86,7 @@ sub returnRadiusAccessAccept { } else{ - $logger->info("[$args->{'mac'}] Returning ACCEPT"); + $logger->info("Returning ACCEPT"); $radius_reply_ref = $filter->handleAnswerInRule($rule,$args,$radius_reply_ref); return [$RADIUS::RLM_MODULE_OK, %$radius_reply_ref]; } diff --git a/lib/pf/Switch/Cisco/Catalyst_2960_http.pm b/lib/pf/Switch/Cisco/Catalyst_2960_http.pm index 4ba97f2eae71..da3fe1cc2942 100644 --- a/lib/pf/Switch/Cisco/Catalyst_2960_http.pm +++ b/lib/pf/Switch/Cisco/Catalyst_2960_http.pm @@ -139,7 +139,7 @@ sub returnRadiusAccessAccept { }); pf::locationlog::locationlog_set_session($mac, $session_id); my $redirect_url = $this->{'_portalURL'}."/cep$session_id"; - $logger->info("[$args->{'mac'}] Adding web authentication redirection to reply using role : $role and URL : $redirect_url."); + $logger->info("Adding web authentication redirection to reply using role : $role and URL : $redirect_url."); push @av_pairs, "url-redirect-acl=$role"; push @av_pairs, "url-redirect=".$redirect_url; diff --git a/lib/pf/Switch/Mikrotik.pm b/lib/pf/Switch/Mikrotik.pm index f1c10666ab01..ead4feb60a16 100644 --- a/lib/pf/Switch/Mikrotik.pm +++ b/lib/pf/Switch/Mikrotik.pm @@ -210,7 +210,7 @@ sub returnRadiusAccessAccept { }; } - $logger->info("[$args->{'mac'}] (".$self->{'_id'}.") Returning ACCEPT with VLAN $args->{'vlan'} and role $role"); + $logger->info("(".$self->{'_id'}.") Returning ACCEPT with VLAN $args->{'vlan'} and role $role"); my $filter = pf::access_filter::radius->new; my $rule = $filter->test('returnRadiusAccessAccept', $args); $radius_reply_ref = $filter->handleAnswerInRule($rule,$args,$radius_reply_ref); diff --git a/lib/pf/Switch/Xirrus/AP_http.pm b/lib/pf/Switch/Xirrus/AP_http.pm index 2642b02b8c60..4defbba0de30 100644 --- a/lib/pf/Switch/Xirrus/AP_http.pm +++ b/lib/pf/Switch/Xirrus/AP_http.pm @@ -96,7 +96,7 @@ sub returnRadiusAccessAccept { my $violation = pf::violation::violation_view_top($args->{'mac'}); # if user is unregistered or is in violation then we reject him to show him the captive portal if ( $node->{status} eq $pf::node::STATUS_UNREGISTERED || defined($violation) ){ - $logger->info("[$args->{'mac'}] is unregistered. Refusing access to force the eCWP"); + $logger->info("is unregistered. Refusing access to force the eCWP"); my $radius_reply_ref = { 'Tunnel-Medium-Type' => $RADIUS::ETHERNET, 'Tunnel-Type' => $RADIUS::VLAN,