This is an automated email from the ASF dual-hosted git repository. markt pushed a commit to branch main in repository https://gitbox.apache.org/repos/asf/tomcat.git
The following commit(s) were added to refs/heads/main by this push: new 40a6d8cc75 Review debug logging 40a6d8cc75 is described below commit 40a6d8cc75ed33074e55f4e1c027e53fb2149165 Author: Mark Thomas <ma...@apache.org> AuthorDate: Tue Aug 19 17:03:46 2025 +0100 Review debug logging --- java/org/apache/catalina/authenticator/BasicAuthenticator.java | 2 +- java/org/apache/catalina/authenticator/FormAuthenticator.java | 2 +- java/org/apache/catalina/authenticator/LocalStrings.properties | 2 +- java/org/apache/catalina/deploy/NamingResourcesImpl.java | 4 ++-- java/org/apache/catalina/filters/RemoteIpFilter.java | 4 ++-- java/org/apache/catalina/realm/JAASRealm.java | 6 +++--- java/org/apache/catalina/session/FileStore.java | 2 +- java/org/apache/catalina/session/StandardManager.java | 2 +- java/org/apache/catalina/valves/RemoteIpValve.java | 2 +- java/org/apache/coyote/http2/Http2UpgradeHandler.java | 1 + java/org/apache/tomcat/util/IntrospectionUtils.java | 4 ++-- java/org/apache/tomcat/util/digester/Digester.java | 2 +- .../main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java | 2 +- 13 files changed, 18 insertions(+), 17 deletions(-) diff --git a/java/org/apache/catalina/authenticator/BasicAuthenticator.java b/java/org/apache/catalina/authenticator/BasicAuthenticator.java index 0b932c4192..18d2da119a 100644 --- a/java/org/apache/catalina/authenticator/BasicAuthenticator.java +++ b/java/org/apache/catalina/authenticator/BasicAuthenticator.java @@ -89,7 +89,7 @@ public class BasicAuthenticator extends AuthenticatorBase { } } catch (IllegalArgumentException iae) { if (log.isDebugEnabled()) { - log.debug(sm.getString("basicAuthenticator.invalidAuthorization", iae.getMessage())); + log.debug(sm.getString("basicAuthenticator.invalidAuthorization"), iae); } } } diff --git a/java/org/apache/catalina/authenticator/FormAuthenticator.java b/java/org/apache/catalina/authenticator/FormAuthenticator.java index e54cc5a2d6..56c5228284 100644 --- a/java/org/apache/catalina/authenticator/FormAuthenticator.java +++ b/java/org/apache/catalina/authenticator/FormAuthenticator.java @@ -245,7 +245,7 @@ public class FormAuthenticator extends AuthenticatorBase { try { saveRequest(request, session); } catch (IOException ioe) { - log.debug(sm.getString("authenticator.requestBodyTooBig")); + log.debug(sm.getString("authenticator.requestBodyTooBig"), ioe); response.sendError(HttpServletResponse.SC_FORBIDDEN, sm.getString("authenticator.requestBodyTooBig")); return false; } diff --git a/java/org/apache/catalina/authenticator/LocalStrings.properties b/java/org/apache/catalina/authenticator/LocalStrings.properties index 3736c0b345..e4fa550a0c 100644 --- a/java/org/apache/catalina/authenticator/LocalStrings.properties +++ b/java/org/apache/catalina/authenticator/LocalStrings.properties @@ -39,7 +39,7 @@ authenticator.unauthorized=Cannot authenticate with the provided credentials authenticator.userDataPermissionFail=User data does not comply with the constraints of the resource authenticator.userPermissionFail=User [{0}] does not have authorization to access the resource -basicAuthenticator.invalidAuthorization=Invalid Authorization: [{0}] +basicAuthenticator.invalidAuthorization=Invalid Authorization header basicAuthenticator.invalidCharset=The only permitted values are null, the empty string or UTF-8 basicAuthenticator.notBase64=Basic Authorization credentials are not Base64 basicAuthenticator.notBasic=Authorization header method is not ''Basic'' diff --git a/java/org/apache/catalina/deploy/NamingResourcesImpl.java b/java/org/apache/catalina/deploy/NamingResourcesImpl.java index 0e53f74030..fb32ac3a68 100644 --- a/java/org/apache/catalina/deploy/NamingResourcesImpl.java +++ b/java/org/apache/catalina/deploy/NamingResourcesImpl.java @@ -979,10 +979,10 @@ public class NamingResourcesImpl extends LifecycleMBeanBase implements Serializa try { m = resource.getClass().getMethod(closeMethod, (Class<?>[]) null); } catch (SecurityException e) { - log.debug(sm.getString("namingResources.cleanupCloseSecurity", closeMethod, name, container)); + log.debug(sm.getString("namingResources.cleanupCloseSecurity", closeMethod, name, container), e); return; } catch (NoSuchMethodException e) { - log.debug(sm.getString("namingResources.cleanupNoClose", name, container, closeMethod)); + log.debug(sm.getString("namingResources.cleanupNoClose", name, container, closeMethod), e); return; } try { diff --git a/java/org/apache/catalina/filters/RemoteIpFilter.java b/java/org/apache/catalina/filters/RemoteIpFilter.java index fa091b4bde..cd38e8d4a5 100644 --- a/java/org/apache/catalina/filters/RemoteIpFilter.java +++ b/java/org/apache/catalina/filters/RemoteIpFilter.java @@ -842,7 +842,7 @@ public class RemoteIpFilter extends GenericFilter { } } catch (IllegalArgumentException iae) { - log.debug(sm.getString("remoteIpFilter.invalidHostHeader", hostHeaderValue, hostHeader)); + log.debug(sm.getString("remoteIpFilter.invalidHostHeader", hostHeaderValue, hostHeader), iae); } } } @@ -904,7 +904,7 @@ public class RemoteIpFilter extends GenericFilter { try { port = Integer.parseInt(portHeaderValue); } catch (NumberFormatException nfe) { - log.debug(sm.getString("remoteIpFilter.invalidPort", portHeaderValue, getPortHeader())); + log.debug(sm.getString("remoteIpFilter.invalidPort", portHeaderValue, getPortHeader()), nfe); } } } diff --git a/java/org/apache/catalina/realm/JAASRealm.java b/java/org/apache/catalina/realm/JAASRealm.java index 1deeb9c6f2..deb60f6b61 100644 --- a/java/org/apache/catalina/realm/JAASRealm.java +++ b/java/org/apache/catalina/realm/JAASRealm.java @@ -395,7 +395,7 @@ public class JAASRealm extends RealmBase { } } catch (AccountExpiredException e) { if (log.isDebugEnabled()) { - log.debug(sm.getString("jaasRealm.accountExpired", username)); + log.debug(sm.getString("jaasRealm.accountExpired", username), e); } // JAAS checked LoginExceptions are successful authentication // invocations so mark JAAS realm as available @@ -403,7 +403,7 @@ public class JAASRealm extends RealmBase { return null; } catch (CredentialExpiredException e) { if (log.isDebugEnabled()) { - log.debug(sm.getString("jaasRealm.credentialExpired", username)); + log.debug(sm.getString("jaasRealm.credentialExpired", username), e); } // JAAS checked LoginExceptions are successful authentication // invocations so mark JAAS realm as available @@ -411,7 +411,7 @@ public class JAASRealm extends RealmBase { return null; } catch (FailedLoginException e) { if (log.isDebugEnabled()) { - log.debug(sm.getString("jaasRealm.failedLogin", username)); + log.debug(sm.getString("jaasRealm.failedLogin", username), e); } // JAAS checked LoginExceptions are successful authentication // invocations so mark JAAS realm as available diff --git a/java/org/apache/catalina/session/FileStore.java b/java/org/apache/catalina/session/FileStore.java index 28adba7682..8b9ac3baba 100644 --- a/java/org/apache/catalina/session/FileStore.java +++ b/java/org/apache/catalina/session/FileStore.java @@ -204,7 +204,7 @@ public final class FileStore extends StoreBase { return session; } catch (FileNotFoundException e) { if (contextLog.isDebugEnabled()) { - contextLog.debug(sm.getString("fileStore.noFile", id, file.getAbsolutePath())); + contextLog.debug(sm.getString("fileStore.noFile", id, file.getAbsolutePath()), e); } return null; } finally { diff --git a/java/org/apache/catalina/session/StandardManager.java b/java/org/apache/catalina/session/StandardManager.java index 8fb55ff3ee..0353359c79 100644 --- a/java/org/apache/catalina/session/StandardManager.java +++ b/java/org/apache/catalina/session/StandardManager.java @@ -167,7 +167,7 @@ public class StandardManager extends ManagerBase { } } catch (FileNotFoundException e) { if (log.isDebugEnabled()) { - log.debug(sm.getString("standardManager.noFile", file.getAbsolutePath())); + log.debug(sm.getString("standardManager.noFile", file.getAbsolutePath()), e); } return; } diff --git a/java/org/apache/catalina/valves/RemoteIpValve.java b/java/org/apache/catalina/valves/RemoteIpValve.java index 5a16e0dbf5..b2cc887c5b 100644 --- a/java/org/apache/catalina/valves/RemoteIpValve.java +++ b/java/org/apache/catalina/valves/RemoteIpValve.java @@ -683,7 +683,7 @@ public class RemoteIpValve extends ValveBase { } } catch (IllegalArgumentException iae) { - log.debug(sm.getString("remoteIpValve.invalidHostHeader", hostHeaderValue, hostHeader)); + log.debug(sm.getString("remoteIpValve.invalidHostHeader", hostHeaderValue, hostHeader), iae); } } } diff --git a/java/org/apache/coyote/http2/Http2UpgradeHandler.java b/java/org/apache/coyote/http2/Http2UpgradeHandler.java index 27b0c046c3..1c2ad63da0 100644 --- a/java/org/apache/coyote/http2/Http2UpgradeHandler.java +++ b/java/org/apache/coyote/http2/Http2UpgradeHandler.java @@ -658,6 +658,7 @@ class Http2UpgradeHandler extends AbstractStream implements InternalHttpUpgradeH } socketWrapper.flush(true); } catch (IOException ioe) { + // Exception is logged further up stack String msg = sm.getString("upgradeHandler.sendPrefaceFail", connectionId); if (log.isDebugEnabled()) { log.debug(msg); diff --git a/java/org/apache/tomcat/util/IntrospectionUtils.java b/java/org/apache/tomcat/util/IntrospectionUtils.java index 30b239b4f8..647ad2e128 100644 --- a/java/org/apache/tomcat/util/IntrospectionUtils.java +++ b/java/org/apache/tomcat/util/IntrospectionUtils.java @@ -144,7 +144,7 @@ public final class IntrospectionUtils { params[0] = InetAddress.getByName(value); } catch (UnknownHostException exc) { if (log.isDebugEnabled()) { - log.debug(sm.getString("introspectionUtils.hostResolutionFail", value)); + log.debug(sm.getString("introspectionUtils.hostResolutionFail", value), exc); } ok = false; } @@ -542,7 +542,7 @@ public final class IntrospectionUtils { result = InetAddress.getByName(object); } catch (UnknownHostException exc) { if (log.isDebugEnabled()) { - log.debug(sm.getString("introspectionUtils.hostResolutionFail", object)); + log.debug(sm.getString("introspectionUtils.hostResolutionFail", object), exc); } } diff --git a/java/org/apache/tomcat/util/digester/Digester.java b/java/org/apache/tomcat/util/digester/Digester.java index 00e2c3e00b..19a641f21d 100644 --- a/java/org/apache/tomcat/util/digester/Digester.java +++ b/java/org/apache/tomcat/util/digester/Digester.java @@ -1386,7 +1386,7 @@ public class Digester extends DefaultHandler2 { } } catch (URISyntaxException e) { if (log.isDebugEnabled()) { - log.debug(sm.getString("digester.invalidURI", baseURI, systemId)); + log.debug(sm.getString("digester.invalidURI", baseURI, systemId), e); } } } diff --git a/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java b/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java index d605c9e575..1d777a69e6 100644 --- a/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java +++ b/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java @@ -571,7 +571,7 @@ public class DataSourceFactory implements ObjectFactory { log.warn("dataSourceJNDI property is configured, but local JNDI context is null."); } } catch (NamingException e) { - log.debug("The name \""+poolProperties.getDataSourceJNDI()+"\" cannot be found in the local context."); + log.debug("The name \""+poolProperties.getDataSourceJNDI()+"\" cannot be found in the local context.", e); } if (jndiDS==null) { try { --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org