@@ -99,12 +99,12 @@ static SqlAuthenticationToken getSqlFedAuthToken(SqlFedAuthInfo fedAuthInfo, Str
99
99
persistentTokenCacheAccessAspect = new PersistentTokenCacheAccessAspect ();
100
100
TOKEN_CACHE_MAP .addEntry (hashedSecret , persistentTokenCacheAccessAspect );
101
101
102
- if (logger .isLoggable (Level .FINEST )) {
103
- logger .finest (LOGCONTEXT + ": cache token for user: " + user );
102
+ if (logger .isLoggable (Level .FINER )) {
103
+ logger .finer (LOGCONTEXT + ": cache token for user: " + user );
104
104
}
105
105
} else {
106
- if (logger .isLoggable (Level .FINEST )) {
107
- logger .finest (LOGCONTEXT + ": retrieved cached token for user: " + user );
106
+ if (logger .isLoggable (Level .FINER )) {
107
+ logger .finer (LOGCONTEXT + ": retrieved cached token for user: " + user );
108
108
}
109
109
}
110
110
@@ -118,8 +118,8 @@ static SqlAuthenticationToken getSqlFedAuthToken(SqlFedAuthInfo fedAuthInfo, Str
118
118
119
119
final IAuthenticationResult authenticationResult = future .get ();
120
120
121
- if (logger .isLoggable (Level .FINEST )) {
122
- logger .finest (
121
+ if (logger .isLoggable (Level .FINER )) {
122
+ logger .finer (
123
123
LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
124
124
+ ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
125
125
}
@@ -165,12 +165,12 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipal(SqlFedAuthInfo fedAuth
165
165
persistentTokenCacheAccessAspect = new PersistentTokenCacheAccessAspect ();
166
166
TOKEN_CACHE_MAP .addEntry (hashedSecret , persistentTokenCacheAccessAspect );
167
167
168
- if (logger .isLoggable (Level .FINEST )) {
169
- logger .finest (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
168
+ if (logger .isLoggable (Level .FINER )) {
169
+ logger .finer (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
170
170
}
171
171
} else {
172
- if (logger .isLoggable (Level .FINEST )) {
173
- logger .finest (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
172
+ if (logger .isLoggable (Level .FINER )) {
173
+ logger .finer (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
174
174
}
175
175
}
176
176
@@ -183,8 +183,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipal(SqlFedAuthInfo fedAuth
183
183
.acquireToken (ClientCredentialParameters .builder (scopes ).build ());
184
184
final IAuthenticationResult authenticationResult = future .get ();
185
185
186
- if (logger .isLoggable (Level .FINEST )) {
187
- logger .finest (
186
+ if (logger .isLoggable (Level .FINER )) {
187
+ logger .finer (
188
188
LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
189
189
+ ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
190
190
}
@@ -232,12 +232,12 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipalCertificate(SqlFedAuthI
232
232
persistentTokenCacheAccessAspect = new PersistentTokenCacheAccessAspect ();
233
233
TOKEN_CACHE_MAP .addEntry (hashedSecret , persistentTokenCacheAccessAspect );
234
234
235
- if (logger .isLoggable (Level .FINEST )) {
236
- logger .finest (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
235
+ if (logger .isLoggable (Level .FINER )) {
236
+ logger .finer (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
237
237
}
238
238
} else {
239
- if (logger .isLoggable (Level .FINEST )) {
240
- logger .finest (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
239
+ if (logger .isLoggable (Level .FINER )) {
240
+ logger .finer (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
241
241
}
242
242
}
243
243
@@ -270,21 +270,21 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipalCertificate(SqlFedAuthI
270
270
0 , null );
271
271
} catch (CertificateException | NoSuchAlgorithmException | IOException e ) {
272
272
// ignore not PKCS12 cert error, will try another format after this
273
- if (logger .isLoggable (Level .FINEST )) {
274
- logger .finest (LOGCONTEXT + "Error loading PKCS12 certificate: " + e .getMessage ());
273
+ if (logger .isLoggable (Level .FINER )) {
274
+ logger .finer (LOGCONTEXT + "Error loading PKCS12 certificate: " + e .getMessage ());
275
275
}
276
276
}
277
277
278
278
if (clientApplication == null ) {
279
279
// try loading X509 cert
280
280
X509Certificate cert = (X509Certificate ) SQLServerCertificateUtils .loadCertificate (certFile );
281
281
282
- if (logger .isLoggable (Level .FINEST )) {
283
- logger .finest (LOGCONTEXT + "certificate type: " + cert .getType ());
282
+ if (logger .isLoggable (Level .FINER )) {
283
+ logger .finer (LOGCONTEXT + "certificate type: " + cert .getType ());
284
284
285
285
// we don't really need to do this, MSAL will fail if cert is not valid, but good to check here and throw with proper error message
286
286
cert .checkValidity ();
287
- logger .finest (LOGCONTEXT + "certificate: " + cert .toString ());
287
+ logger .finer (LOGCONTEXT + "certificate: " + cert .toString ());
288
288
}
289
289
290
290
PrivateKey privateKey = SQLServerCertificateUtils .loadPrivateKey (certKey , certKeyPassword );
@@ -299,8 +299,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipalCertificate(SqlFedAuthI
299
299
.acquireToken (ClientCredentialParameters .builder (scopes ).build ());
300
300
final IAuthenticationResult authenticationResult = future .get ();
301
301
302
- if (logger .isLoggable (Level .FINEST )) {
303
- logger .finest (
302
+ if (logger .isLoggable (Level .FINER )) {
303
+ logger .finer (
304
304
LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
305
305
+ ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
306
306
}
@@ -335,8 +335,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenIntegrated(SqlFedAuthInfo fedAut
335
335
KerberosPrincipal kerberosPrincipal = new KerberosPrincipal ("username" );
336
336
String user = kerberosPrincipal .getName ();
337
337
338
- if (logger .isLoggable (Level .FINEST )) {
339
- logger .finest (LOGCONTEXT + authenticationString + ": get FedAuth token integrated, user: " + user
338
+ if (logger .isLoggable (Level .FINER )) {
339
+ logger .finer (LOGCONTEXT + authenticationString + ": get FedAuth token integrated, user: " + user
340
340
+ "realm name:" + kerberosPrincipal .getRealm ());
341
341
}
342
342
@@ -354,8 +354,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenIntegrated(SqlFedAuthInfo fedAut
354
354
355
355
final IAuthenticationResult authenticationResult = future .get ();
356
356
357
- if (logger .isLoggable (Level .FINEST )) {
358
- logger .finest (
357
+ if (logger .isLoggable (Level .FINER )) {
358
+ logger .finer (
359
359
LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
360
360
+ ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
361
361
}
@@ -378,8 +378,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenInteractive(SqlFedAuthInfo fedAu
378
378
String authenticationString ) throws SQLServerException {
379
379
ExecutorService executorService = Executors .newSingleThreadExecutor ();
380
380
381
- if (logger .isLoggable (Level .FINEST )) {
382
- logger .finest (LOGCONTEXT + authenticationString + ": get FedAuth token interactive for user: " + user );
381
+ if (logger .isLoggable (Level .FINER )) {
382
+ logger .finer (LOGCONTEXT + authenticationString + ": get FedAuth token interactive for user: " + user );
383
383
}
384
384
385
385
lock .lock ();
@@ -406,8 +406,10 @@ static SqlAuthenticationToken getSqlFedAuthTokenInteractive(SqlFedAuthInfo fedAu
406
406
acc .append (account .username ());
407
407
}
408
408
}
409
- logger .finest (LOGCONTEXT + "Accounts in cache = " + acc + ", size = "
410
- + (accountsInCache == null ? null : accountsInCache .size ()) + ", user = " + user );
409
+ if (logger .isLoggable (Level .FINEST )) {
410
+ logger .finest (LOGCONTEXT + "Accounts in cache = " + acc + ", size = "
411
+ + (accountsInCache == null ? null : accountsInCache .size ()) + ", user = " + user );
412
+ }
411
413
}
412
414
if (null != accountsInCache && !accountsInCache .isEmpty () && null != user && !user .isEmpty ()) {
413
415
IAccount account = getAccountByUsername (accountsInCache , user );
@@ -445,8 +447,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenInteractive(SqlFedAuthInfo fedAu
445
447
authenticationResult = future .get ();
446
448
}
447
449
448
- if (logger .isLoggable (Level .FINEST )) {
449
- logger .finest (
450
+ if (logger .isLoggable (Level .FINER )) {
451
+ logger .finer (
450
452
LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
451
453
+ ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
452
454
}
@@ -526,8 +528,8 @@ PersistentTokenCacheAccessAspect getEntry(String value, String key) {
526
528
527
529
tokenCacheMap .put (key , persistentTokenCacheAccessAspect );
528
530
529
- if (logger .isLoggable (Level .FINEST )) {
530
- logger .finest (LOGCONTEXT + ": entry expired for: " + value + " new entry will expire in: "
531
+ if (logger .isLoggable (Level .FINER )) {
532
+ logger .finer (LOGCONTEXT + ": entry expired for: " + value + " new entry will expire in: "
531
533
+ TimeUnit .MILLISECONDS .toSeconds (PersistentTokenCacheAccessAspect .TIME_TO_LIVE ) + "s" );
532
534
}
533
535
}
@@ -539,8 +541,8 @@ PersistentTokenCacheAccessAspect getEntry(String value, String key) {
539
541
void addEntry (String key , PersistentTokenCacheAccessAspect value ) {
540
542
value .setExpiryTime (System .currentTimeMillis () + PersistentTokenCacheAccessAspect .TIME_TO_LIVE );
541
543
tokenCacheMap .put (key , value );
542
- if (logger .isLoggable (Level .FINEST )) {
543
- logger .finest (LOGCONTEXT + ": add entry for: " + value + ", will expire in: "
544
+ if (logger .isLoggable (Level .FINER )) {
545
+ logger .finer (LOGCONTEXT + ": add entry for: " + value + ", will expire in: "
544
546
+ TimeUnit .MILLISECONDS .toSeconds (PersistentTokenCacheAccessAspect .TIME_TO_LIVE ) + "s" );
545
547
}
546
548
}
0 commit comments