-
-
Notifications
You must be signed in to change notification settings - Fork 3.7k
HHH-19611 demote many DEBUG-level log messages to TRACE #10525
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
since Quarkus insists on doing something completely crazy with our INFO level
put them all in a single log message
because it results in logging telling us not to do it
and clean up some Logger descriptions
…to JdbcLogging and include SF uuid in log messages
at least for now - it was just too verbose
at least for now - it was just too ugly and verbose
motivated by work on logging cleanup
|
Thanks for your pull request! This pull request does not follow the contribution rules. Could you have a look? ❌ All commit messages should start with a JIRA issue key matching pattern › This message was automatically generated. |
| if ( log.isDebugEnabled() ) { | ||
| log.debugf( "Performing JAXB binding of hbm.xml document : %s", origin.toString() ); | ||
| if ( log.isTraceEnabled() ) { | ||
| log.tracef( "Performing JAXB binding of hbm.xml document: %s", origin.toString() ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| assert "entity-mappings".equals( rootElementLocalName ); | ||
| try { | ||
| log.debugf( "Performing JAXB binding of orm.xml document : %s", origin.toString() ); | ||
| log.tracef( "Performing JAXB binding of orm.xml document: %s", origin.toString() ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
hibernate-core/src/main/java/org/hibernate/cache/spi/support/AbstractReadWriteAccess.java
Fixed
Show fixed
Hide fixed
hibernate-core/src/main/java/org/hibernate/cache/spi/support/AbstractReadWriteAccess.java
Fixed
Show fixed
Hide fixed
hibernate-core/src/main/java/org/hibernate/cache/spi/support/AbstractReadWriteAccess.java
Fixed
Show fixed
Hide fixed
| if ( log.isDebugEnabled() ) { | ||
| final EntityPersister persister = requireEntityPersister( entityName ); | ||
| log.debugf( "Initializing proxy: %s", infoString( persister, id, getFactory() ) ); | ||
| log.tracef( "Initializing proxy: %s", infoString( persister, id, getFactory() ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
hibernate-core/src/main/java/org/hibernate/loader/ast/internal/AbstractEntityBatchLoader.java
Fixed
Show fixed
Hide fixed
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| // Incredibly verbose logging disabled | ||
| // LOG.tracef( "Adding type registration %s -> %s", key, type ); | ||
|
|
||
| final Type old = typesByName.put( key, type ); |
Check notice
Code scanning / CodeQL
Unread local variable Note
| // Incredibly verbose logging disabled | ||
| // LOG.tracef( "Adding type registration %s -> %s", key, type ); | ||
|
|
||
| final BasicTypeReference<?> old = typeReferencesByName.put( key, type ); |
Check notice
Code scanning / CodeQL
Unread local variable Note
| */ | ||
| public static XmlSource fromResource(String resourceName, ClassLoaderService classLoaderService) { | ||
| JaxbLogger.JAXB_LOGGER.tracef( "reading mappings from resource : %s", resourceName ); | ||
| JAXB_LOGGER.tracef( "Reading mappings from resource: %s", resourceName ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
hibernate-core/src/main/java/org/hibernate/loader/ast/internal/AbstractEntityBatchLoader.java
Fixed
Show fixed
Hide fixed
hibernate-core/src/main/java/org/hibernate/loader/ast/internal/EntityBatchLoaderArrayParam.java
Fixed
Show fixed
Hide fixed
...rnate-core/src/main/java/org/hibernate/loader/ast/internal/EntityBatchLoaderInPredicate.java
Fixed
Show fixed
Hide fixed
...rnate-core/src/main/java/org/hibernate/loader/ast/internal/EntityBatchLoaderInPredicate.java
Fixed
Show fixed
Hide fixed
| MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching collection: " | ||
| + collectionInfoString( getLoadable(), key ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| MULTI_KEY_LOAD_LOGGER.trace( "Finishing initializing batch-fetched collection: " | ||
| + collectionInfoString( attributeMapping, key ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching entity: " | ||
| + infoString( getLoadable(), id ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching entity: " | ||
| + infoString( getLoadable(), id ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching collection: " | ||
| + collectionInfoString( getLoadable(), keyBeingLoaded ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| key, | ||
| MULTI_KEY_LOAD_LOGGER.tracef( | ||
| "Processing collection batch-fetch chunk (%s) %s - %s", | ||
| collectionInfoString( getLoadable(), key ), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| LOADER_LOGGER.trace( "Retrieving snapshot of current persistent state for " | ||
| + infoString( entityDescriptor, id ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| getLoadable().getEntityName(), id, Arrays.toString(idsToInitialize) ); | ||
| if ( MULTI_KEY_LOAD_LOGGER.isTraceEnabled() ) { | ||
| MULTI_KEY_LOAD_LOGGER.tracef( "Entity ids to initialize via batch fetching (%s) %s", | ||
| infoString( getLoadable(), id), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| getLoadable().getEntityName(), pkValue, Arrays.toString(idsToInitialize) ); | ||
| if ( MULTI_KEY_LOAD_LOGGER.isTraceEnabled() ) { | ||
| MULTI_KEY_LOAD_LOGGER.tracef( "Entity ids to initialize via batch fetching (%s) %s", | ||
| infoString( getLoadable(), pkValue ), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| if ( MULTI_KEY_LOAD_LOGGER.isTraceEnabled() ) { | ||
| MULTI_KEY_LOAD_LOGGER.tracef( | ||
| "Processing entity batch-fetch chunk (%s) %s - %s", | ||
| infoString( getLoadable(), pkValue ), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| final boolean traceEnabled = L2CACHE_LOGGER.isTraceEnabled(); | ||
| if ( traceEnabled ) { | ||
| L2CACHE_LOGGER.tracef( "Getting cached data from region ['%s' (%s)] by key [%s]", | ||
| getRegion().getName(), getAccessType(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| log.debugf( "Cache miss : region = `%s`, key = `%s`", getRegion().getName(), key ); | ||
| if ( traceEnabled ) { | ||
| L2CACHE_LOGGER.tracef( "Cache miss: region = '%s', key = '%s'", | ||
| getRegion().getName(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| log.debugf( "Cache hit : region = `%s`, key = `%s`", getRegion().getName(), key ); | ||
| if ( traceEnabled ) { | ||
| L2CACHE_LOGGER.tracef( "Cache hit: region = '%s', key = '%s'", | ||
| getRegion().getName(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| log.debugf( "Cache hit, but item is unreadable/invalid : region = `%s`, key = `%s`", getRegion().getName(), key ); | ||
| if ( traceEnabled ) { | ||
| L2CACHE_LOGGER.tracef( "Cache hit, but item is unreadable/invalid: region = '%s', key = '%s'", | ||
| getRegion().getName(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| L2CACHE_LOGGER.tracef( "Caching data from load [region='%s' (%s)] : key[%s] -> value[%s]", | ||
| getRegion().getName(), getAccessType(), key, value ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
|
|
||
| @Override |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| writeLock.lock(); | ||
| Lockable item = (Lockable) getStorageAccess().getFromCache( key, session ); | ||
|
|
||
| if ( ( item != null ) && item.isUnlockable( lock ) ) { |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| getStorageAccess().putIntoCache( key, newLock, session ); | ||
| } | ||
|
|
||
| @Override |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| @@ -285,9 +287,9 @@ | |||
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
|
This is massive now, so I'm going to just merge it. |
Redo of #10520.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license
and can be relicensed under the terms of the LGPL v2.1 license in the future at the maintainers' discretion.
For more information on licensing, please check here.