This is an automated email from the ASF dual-hosted git repository.

markt pushed a commit to branch 10.1.x
in repository https://gitbox.apache.org/repos/asf/tomcat.git


The following commit(s) were added to refs/heads/10.1.x by this push:
     new 552fa1c32a Review debug logging
552fa1c32a is described below

commit 552fa1c32a778de337df00a465f018ccdbafa794
Author: Mark Thomas <ma...@apache.org>
AuthorDate: Tue Aug 19 17:03:46 2025 +0100

    Review debug logging
---
 java/org/apache/catalina/authenticator/BasicAuthenticator.java      | 2 +-
 java/org/apache/catalina/authenticator/FormAuthenticator.java       | 2 +-
 java/org/apache/catalina/authenticator/LocalStrings.properties      | 2 +-
 java/org/apache/catalina/deploy/NamingResourcesImpl.java            | 4 ++--
 java/org/apache/catalina/filters/RemoteIpFilter.java                | 4 ++--
 java/org/apache/catalina/realm/JAASRealm.java                       | 6 +++---
 java/org/apache/catalina/session/FileStore.java                     | 2 +-
 java/org/apache/catalina/session/StandardManager.java               | 2 +-
 java/org/apache/catalina/valves/RemoteIpValve.java                  | 2 +-
 java/org/apache/coyote/http2/Http2UpgradeHandler.java               | 1 +
 java/org/apache/tomcat/util/IntrospectionUtils.java                 | 2 +-
 java/org/apache/tomcat/util/digester/Digester.java                  | 2 +-
 .../main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java    | 2 +-
 13 files changed, 17 insertions(+), 16 deletions(-)

diff --git a/java/org/apache/catalina/authenticator/BasicAuthenticator.java 
b/java/org/apache/catalina/authenticator/BasicAuthenticator.java
index 1a1eb2cfb0..cab30c3908 100644
--- a/java/org/apache/catalina/authenticator/BasicAuthenticator.java
+++ b/java/org/apache/catalina/authenticator/BasicAuthenticator.java
@@ -116,7 +116,7 @@ public class BasicAuthenticator extends AuthenticatorBase {
                 }
             } catch (IllegalArgumentException iae) {
                 if (log.isDebugEnabled()) {
-                    
log.debug(sm.getString("basicAuthenticator.invalidAuthorization", 
iae.getMessage()));
+                    
log.debug(sm.getString("basicAuthenticator.invalidAuthorization"), iae);
                 }
             }
         }
diff --git a/java/org/apache/catalina/authenticator/FormAuthenticator.java 
b/java/org/apache/catalina/authenticator/FormAuthenticator.java
index e5b041c1b4..e9056e2c8c 100644
--- a/java/org/apache/catalina/authenticator/FormAuthenticator.java
+++ b/java/org/apache/catalina/authenticator/FormAuthenticator.java
@@ -247,7 +247,7 @@ public class FormAuthenticator extends AuthenticatorBase {
             try {
                 saveRequest(request, session);
             } catch (IOException ioe) {
-                log.debug(sm.getString("authenticator.requestBodyTooBig"));
+                log.debug(sm.getString("authenticator.requestBodyTooBig"), 
ioe);
                 response.sendError(HttpServletResponse.SC_FORBIDDEN, 
sm.getString("authenticator.requestBodyTooBig"));
                 return false;
             }
diff --git a/java/org/apache/catalina/authenticator/LocalStrings.properties 
b/java/org/apache/catalina/authenticator/LocalStrings.properties
index 60ec6605ad..b9c62d8502 100644
--- a/java/org/apache/catalina/authenticator/LocalStrings.properties
+++ b/java/org/apache/catalina/authenticator/LocalStrings.properties
@@ -42,7 +42,7 @@ authenticator.unauthorized=Cannot authenticate with the 
provided credentials
 authenticator.userDataPermissionFail=User data does not comply with the 
constraints of the resource
 authenticator.userPermissionFail=User [{0}] does not have authorization to 
access the resource
 
-basicAuthenticator.invalidAuthorization=Invalid Authorization: [{0}]
+basicAuthenticator.invalidAuthorization=Invalid Authorization header
 basicAuthenticator.invalidCharset=The only permitted values are null, the 
empty string or UTF-8
 basicAuthenticator.notBase64=Basic Authorization credentials are not Base64
 basicAuthenticator.notBasic=Authorization header method is not ''Basic''
diff --git a/java/org/apache/catalina/deploy/NamingResourcesImpl.java 
b/java/org/apache/catalina/deploy/NamingResourcesImpl.java
index dc67e5a320..0afe3d8e93 100644
--- a/java/org/apache/catalina/deploy/NamingResourcesImpl.java
+++ b/java/org/apache/catalina/deploy/NamingResourcesImpl.java
@@ -977,10 +977,10 @@ public class NamingResourcesImpl extends 
LifecycleMBeanBase implements Serializa
         try {
             m = resource.getClass().getMethod(closeMethod, (Class<?>[]) null);
         } catch (SecurityException e) {
-            log.debug(sm.getString("namingResources.cleanupCloseSecurity", 
closeMethod, name, container));
+            log.debug(sm.getString("namingResources.cleanupCloseSecurity", 
closeMethod, name, container), e);
             return;
         } catch (NoSuchMethodException e) {
-            log.debug(sm.getString("namingResources.cleanupNoClose", name, 
container, closeMethod));
+            log.debug(sm.getString("namingResources.cleanupNoClose", name, 
container, closeMethod), e);
             return;
         }
         try {
diff --git a/java/org/apache/catalina/filters/RemoteIpFilter.java 
b/java/org/apache/catalina/filters/RemoteIpFilter.java
index 688801399f..c967dd04fe 100644
--- a/java/org/apache/catalina/filters/RemoteIpFilter.java
+++ b/java/org/apache/catalina/filters/RemoteIpFilter.java
@@ -898,7 +898,7 @@ public class RemoteIpFilter extends GenericFilter {
                         }
 
                     } catch (IllegalArgumentException iae) {
-                        
log.debug(sm.getString("remoteIpFilter.invalidHostHeader", hostHeaderValue, 
hostHeader));
+                        
log.debug(sm.getString("remoteIpFilter.invalidHostHeader", hostHeaderValue, 
hostHeader), iae);
                     }
                 }
             }
@@ -960,7 +960,7 @@ public class RemoteIpFilter extends GenericFilter {
                 try {
                     port = Integer.parseInt(portHeaderValue);
                 } catch (NumberFormatException nfe) {
-                    log.debug(sm.getString("remoteIpFilter.invalidPort", 
portHeaderValue, getPortHeader()));
+                    log.debug(sm.getString("remoteIpFilter.invalidPort", 
portHeaderValue, getPortHeader()), nfe);
                 }
             }
         }
diff --git a/java/org/apache/catalina/realm/JAASRealm.java 
b/java/org/apache/catalina/realm/JAASRealm.java
index 1deeb9c6f2..deb60f6b61 100644
--- a/java/org/apache/catalina/realm/JAASRealm.java
+++ b/java/org/apache/catalina/realm/JAASRealm.java
@@ -395,7 +395,7 @@ public class JAASRealm extends RealmBase {
                 }
             } catch (AccountExpiredException e) {
                 if (log.isDebugEnabled()) {
-                    log.debug(sm.getString("jaasRealm.accountExpired", 
username));
+                    log.debug(sm.getString("jaasRealm.accountExpired", 
username), e);
                 }
                 // JAAS checked LoginExceptions are successful authentication
                 // invocations so mark JAAS realm as available
@@ -403,7 +403,7 @@ public class JAASRealm extends RealmBase {
                 return null;
             } catch (CredentialExpiredException e) {
                 if (log.isDebugEnabled()) {
-                    log.debug(sm.getString("jaasRealm.credentialExpired", 
username));
+                    log.debug(sm.getString("jaasRealm.credentialExpired", 
username), e);
                 }
                 // JAAS checked LoginExceptions are successful authentication
                 // invocations so mark JAAS realm as available
@@ -411,7 +411,7 @@ public class JAASRealm extends RealmBase {
                 return null;
             } catch (FailedLoginException e) {
                 if (log.isDebugEnabled()) {
-                    log.debug(sm.getString("jaasRealm.failedLogin", username));
+                    log.debug(sm.getString("jaasRealm.failedLogin", username), 
e);
                 }
                 // JAAS checked LoginExceptions are successful authentication
                 // invocations so mark JAAS realm as available
diff --git a/java/org/apache/catalina/session/FileStore.java 
b/java/org/apache/catalina/session/FileStore.java
index 2695af2bbd..375de3df4d 100644
--- a/java/org/apache/catalina/session/FileStore.java
+++ b/java/org/apache/catalina/session/FileStore.java
@@ -205,7 +205,7 @@ public final class FileStore extends StoreBase {
             return session;
         } catch (FileNotFoundException e) {
             if (contextLog.isDebugEnabled()) {
-                contextLog.debug(sm.getString("fileStore.noFile", id, 
file.getAbsolutePath()));
+                contextLog.debug(sm.getString("fileStore.noFile", id, 
file.getAbsolutePath()), e);
             }
             return null;
         } finally {
diff --git a/java/org/apache/catalina/session/StandardManager.java 
b/java/org/apache/catalina/session/StandardManager.java
index 18bf534aaf..9d4c603c19 100644
--- a/java/org/apache/catalina/session/StandardManager.java
+++ b/java/org/apache/catalina/session/StandardManager.java
@@ -229,7 +229,7 @@ public class StandardManager extends ManagerBase {
             }
         } catch (FileNotFoundException e) {
             if (log.isDebugEnabled()) {
-                log.debug(sm.getString("standardManager.noFile", 
file.getAbsolutePath()));
+                log.debug(sm.getString("standardManager.noFile", 
file.getAbsolutePath()), e);
             }
             return;
         }
diff --git a/java/org/apache/catalina/valves/RemoteIpValve.java 
b/java/org/apache/catalina/valves/RemoteIpValve.java
index e5cb8c6b7c..9e702f0f95 100644
--- a/java/org/apache/catalina/valves/RemoteIpValve.java
+++ b/java/org/apache/catalina/valves/RemoteIpValve.java
@@ -697,7 +697,7 @@ public class RemoteIpValve extends ValveBase {
                         }
 
                     } catch (IllegalArgumentException iae) {
-                        
log.debug(sm.getString("remoteIpValve.invalidHostHeader", hostHeaderValue, 
hostHeader));
+                        
log.debug(sm.getString("remoteIpValve.invalidHostHeader", hostHeaderValue, 
hostHeader), iae);
                     }
                 }
             }
diff --git a/java/org/apache/coyote/http2/Http2UpgradeHandler.java 
b/java/org/apache/coyote/http2/Http2UpgradeHandler.java
index e006baf80c..8041b45234 100644
--- a/java/org/apache/coyote/http2/Http2UpgradeHandler.java
+++ b/java/org/apache/coyote/http2/Http2UpgradeHandler.java
@@ -659,6 +659,7 @@ class Http2UpgradeHandler extends AbstractStream implements 
InternalHttpUpgradeH
             }
             socketWrapper.flush(true);
         } catch (IOException ioe) {
+            // Exception is logged further up stack
             String msg = sm.getString("upgradeHandler.sendPrefaceFail", 
connectionId);
             if (log.isDebugEnabled()) {
                 log.debug(msg);
diff --git a/java/org/apache/tomcat/util/IntrospectionUtils.java 
b/java/org/apache/tomcat/util/IntrospectionUtils.java
index 8ada638f91..884226c3f2 100644
--- a/java/org/apache/tomcat/util/IntrospectionUtils.java
+++ b/java/org/apache/tomcat/util/IntrospectionUtils.java
@@ -547,7 +547,7 @@ public final class IntrospectionUtils {
                 result = InetAddress.getByName(object);
             } catch (UnknownHostException exc) {
                 if (log.isDebugEnabled()) {
-                    
log.debug(sm.getString("introspectionUtils.hostResolutionFail", object));
+                    
log.debug(sm.getString("introspectionUtils.hostResolutionFail", object), exc);
                 }
             }
 
diff --git a/java/org/apache/tomcat/util/digester/Digester.java 
b/java/org/apache/tomcat/util/digester/Digester.java
index 12980d1729..84fbec5f05 100644
--- a/java/org/apache/tomcat/util/digester/Digester.java
+++ b/java/org/apache/tomcat/util/digester/Digester.java
@@ -1386,7 +1386,7 @@ public class Digester extends DefaultHandler2 {
                         }
                     } catch (URISyntaxException e) {
                         if (log.isDebugEnabled()) {
-                            log.debug(sm.getString("digester.invalidURI", 
baseURI, systemId));
+                            log.debug(sm.getString("digester.invalidURI", 
baseURI, systemId), e);
                         }
                     }
                 }
diff --git 
a/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java
 
b/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java
index d605c9e575..1d777a69e6 100644
--- 
a/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java
+++ 
b/modules/jdbc-pool/src/main/java/org/apache/tomcat/jdbc/pool/DataSourceFactory.java
@@ -571,7 +571,7 @@ public class DataSourceFactory implements ObjectFactory {
                 log.warn("dataSourceJNDI property is configured, but local 
JNDI context is null.");
             }
         } catch (NamingException e) {
-            log.debug("The name \""+poolProperties.getDataSourceJNDI()+"\" 
cannot be found in the local context.");
+            log.debug("The name \""+poolProperties.getDataSourceJNDI()+"\" 
cannot be found in the local context.", e);
         }
         if (jndiDS==null) {
             try {


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to