-
Notifications
You must be signed in to change notification settings - Fork 3.6k
HHH-19611 demote many DEBUG-level log messages to TRACE #10525
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
since Quarkus insists on doing something completely crazy with our INFO level
put them all in a single log message
because it results in logging telling us not to do it
and clean up some Logger descriptions
…to JdbcLogging and include SF uuid in log messages
at least for now - it was just too verbose
at least for now - it was just too ugly and verbose
motivated by work on logging cleanup
Thanks for your pull request! This pull request does not follow the contribution rules. Could you have a look? ❌ All commit messages should start with a JIRA issue key matching pattern › This message was automatically generated. |
if ( log.isDebugEnabled() ) { | ||
log.debugf( "Performing JAXB binding of hbm.xml document : %s", origin.toString() ); | ||
if ( log.isTraceEnabled() ) { | ||
log.tracef( "Performing JAXB binding of hbm.xml document: %s", origin.toString() ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
@@ -181,7 +181,7 @@ | |||
else { | |||
assert "entity-mappings".equals( rootElementLocalName ); | |||
try { | |||
log.debugf( "Performing JAXB binding of orm.xml document : %s", origin.toString() ); | |||
log.tracef( "Performing JAXB binding of orm.xml document: %s", origin.toString() ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
hibernate-core/src/main/java/org/hibernate/cache/spi/support/AbstractReadWriteAccess.java
Fixed
Show fixed
Hide fixed
hibernate-core/src/main/java/org/hibernate/cache/spi/support/AbstractReadWriteAccess.java
Fixed
Show fixed
Hide fixed
hibernate-core/src/main/java/org/hibernate/cache/spi/support/AbstractReadWriteAccess.java
Fixed
Show fixed
Hide fixed
@@ -1015,7 +1015,7 @@ | |||
public Object immediateLoad(String entityName, Object id) { | |||
if ( log.isDebugEnabled() ) { | |||
final EntityPersister persister = requireEntityPersister( entityName ); | |||
log.debugf( "Initializing proxy: %s", infoString( persister, id, getFactory() ) ); | |||
log.tracef( "Initializing proxy: %s", infoString( persister, id, getFactory() ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
hibernate-core/src/main/java/org/hibernate/loader/ast/internal/AbstractEntityBatchLoader.java
Fixed
Show fixed
Hide fixed
LOG.trace( "Caching collection: " | ||
+ collectionInfoString( collectionDescriptor, collectionInstance, key, session ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
// Incredibly verbose logging disabled | ||
// LOG.tracef( "Adding type registration %s -> %s", key, type ); | ||
|
||
final Type old = typesByName.put( key, type ); |
Check notice
Code scanning / CodeQL
Unread local variable Note
// Incredibly verbose logging disabled | ||
// LOG.tracef( "Adding type registration %s -> %s", key, type ); | ||
|
||
final BasicTypeReference<?> old = typeReferencesByName.put( key, type ); |
Check notice
Code scanning / CodeQL
Unread local variable Note
@@ -38,7 +39,7 @@ | |||
* Create an {@link XmlSource} from a named resource | |||
*/ | |||
public static XmlSource fromResource(String resourceName, ClassLoaderService classLoaderService) { | |||
JaxbLogger.JAXB_LOGGER.tracef( "reading mappings from resource : %s", resourceName ); | |||
JAXB_LOGGER.tracef( "Reading mappings from resource: %s", resourceName ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
hibernate-core/src/main/java/org/hibernate/loader/ast/internal/AbstractEntityBatchLoader.java
Fixed
Show fixed
Hide fixed
hibernate-core/src/main/java/org/hibernate/loader/ast/internal/EntityBatchLoaderArrayParam.java
Fixed
Show fixed
Hide fixed
...rnate-core/src/main/java/org/hibernate/loader/ast/internal/EntityBatchLoaderInPredicate.java
Fixed
Show fixed
Hide fixed
...rnate-core/src/main/java/org/hibernate/loader/ast/internal/EntityBatchLoaderInPredicate.java
Fixed
Show fixed
Hide fixed
MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching collection: " | ||
+ collectionInfoString( getLoadable(), key ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
MULTI_KEY_LOAD_LOGGER.trace( "Finishing initializing batch-fetched collection: " | ||
+ collectionInfoString( attributeMapping, key ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching entity: " | ||
+ infoString( getLoadable(), id ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching entity: " | ||
+ infoString( getLoadable(), id ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
MULTI_KEY_LOAD_LOGGER.trace( "Batch fetching collection: " | ||
+ collectionInfoString( getLoadable(), keyBeingLoaded ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
key, | ||
MULTI_KEY_LOAD_LOGGER.tracef( | ||
"Processing collection batch-fetch chunk (%s) %s - %s", | ||
collectionInfoString( getLoadable(), key ), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
LOADER_LOGGER.trace( "Retrieving snapshot of current persistent state for " | ||
+ infoString( entityDescriptor, id ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
getLoadable().getEntityName(), id, Arrays.toString(idsToInitialize) ); | ||
if ( MULTI_KEY_LOAD_LOGGER.isTraceEnabled() ) { | ||
MULTI_KEY_LOAD_LOGGER.tracef( "Entity ids to initialize via batch fetching (%s) %s", | ||
infoString( getLoadable(), id), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
getLoadable().getEntityName(), pkValue, Arrays.toString(idsToInitialize) ); | ||
if ( MULTI_KEY_LOAD_LOGGER.isTraceEnabled() ) { | ||
MULTI_KEY_LOAD_LOGGER.tracef( "Entity ids to initialize via batch fetching (%s) %s", | ||
infoString( getLoadable(), pkValue ), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
if ( MULTI_KEY_LOAD_LOGGER.isTraceEnabled() ) { | ||
MULTI_KEY_LOAD_LOGGER.tracef( | ||
"Processing entity batch-fetch chunk (%s) %s - %s", | ||
infoString( getLoadable(), pkValue ), |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
final boolean traceEnabled = L2CACHE_LOGGER.isTraceEnabled(); | ||
if ( traceEnabled ) { | ||
L2CACHE_LOGGER.tracef( "Getting cached data from region ['%s' (%s)] by key [%s]", | ||
getRegion().getName(), getAccessType(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
log.debugf( "Cache miss : region = `%s`, key = `%s`", getRegion().getName(), key ); | ||
if ( traceEnabled ) { | ||
L2CACHE_LOGGER.tracef( "Cache miss: region = '%s', key = '%s'", | ||
getRegion().getName(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
log.debugf( "Cache hit : region = `%s`, key = `%s`", getRegion().getName(), key ); | ||
if ( traceEnabled ) { | ||
L2CACHE_LOGGER.tracef( "Cache hit: region = '%s', key = '%s'", | ||
getRegion().getName(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
log.debugf( "Cache hit, but item is unreadable/invalid : region = `%s`, key = `%s`", getRegion().getName(), key ); | ||
if ( traceEnabled ) { | ||
L2CACHE_LOGGER.tracef( "Cache hit, but item is unreadable/invalid: region = '%s', key = '%s'", | ||
getRegion().getName(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
L2CACHE_LOGGER.tracef( "Caching data from load [region='%s' (%s)] : key[%s] -> value[%s]", | ||
getRegion().getName(), getAccessType(), key, value ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
L2CACHE_LOGGER.tracef( "Locking cache item [region='%s' (%s)] : '%s' (timeout=%s, version=%s)", | ||
getRegion().getName(), getAccessType(), key, timeout, version ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
); | ||
if ( L2CACHE_LOGGER.isTraceEnabled() ) { | ||
L2CACHE_LOGGER.tracef( "Unlocking cache item [region='%s' (%s)] : %s", | ||
getRegion().getName(), getAccessType(), key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
@@ -205,7 +205,7 @@ | |||
|
|||
protected void handleLockExpiry(SharedSessionContractImplementor session, Object key, Lockable lock) { | |||
L2CACHE_LOGGER.softLockedCacheExpired( getRegion().getName(), key ); | |||
log.debugf( "Cached entry expired : %s", key ); | |||
L2CACHE_LOGGER.tracef( "Cached entry expired: %s", key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
@@ -219,7 +219,9 @@ | |||
@Override | |||
public void remove(SharedSessionContractImplementor session, Object key) { | |||
if ( getStorageAccess().getFromCache( key, session ) instanceof SoftLock ) { | |||
log.debugf( "Skipping #remove call in read-write access to maintain SoftLock : %s", key ); | |||
if ( L2CACHE_LOGGER.isDebugEnabled() ) { | |||
L2CACHE_LOGGER.debugf( "Skipping remove call in read-write access to maintain SoftLock: ", key ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
This is massive now, so I'm going to just merge it. |
Redo of #10520.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license
and can be relicensed under the terms of the LGPL v2.1 license in the future at the maintainers' discretion.
For more information on licensing, please check here.