You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tomcat.apache.org by re...@apache.org on 2021/11/18 21:59:45 UTC
[tomcat] branch main updated: Rename logger to log
This is an automated email from the ASF dual-hosted git repository.
remm pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/tomcat.git
The following commit(s) were added to refs/heads/main by this push:
new c3412ad Rename logger to log
c3412ad is described below
commit c3412ad28f72cbaf024967978c1c1690d3c5a27d
Author: remm <re...@apache.org>
AuthorDate: Thu Nov 18 22:57:38 2021 +0100
Rename logger to log
Also remove FIXME since it looks good enough to me.
---
.../util/net/openssl/panama/OpenSSLEngine.java | 37 +++++++++++-----------
1 file changed, 18 insertions(+), 19 deletions(-)
diff --git a/modules/openssl-java17/src/main/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java b/modules/openssl-java17/src/main/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java
index 4fb17a4..75cca5a 100644
--- a/modules/openssl-java17/src/main/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java
+++ b/modules/openssl-java17/src/main/java/org/apache/tomcat/util/net/openssl/panama/OpenSSLEngine.java
@@ -74,7 +74,7 @@ import org.apache.tomcat.util.res.StringManager;
*/
public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolInfo {
- private static final Log logger = LogFactory.getLog(OpenSSLEngine.class);
+ private static final Log log = LogFactory.getLog(OpenSSLEngine.class);
private static final StringManager sm = StringManager.getManager(OpenSSLEngine.class);
private static final Certificate[] EMPTY_CERTIFICATES = new Certificate[0];
@@ -127,7 +127,7 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
SSL_CTX_free(sslCtx);
}
} catch (Exception e) {
- logger.warn(sm.getString("engine.ciphersFailure"), e);
+ log.warn(sm.getString("engine.ciphersFailure"), e);
}
AVAILABLE_CIPHER_SUITES = Collections.unmodifiableSet(availableCipherSuites);
@@ -814,7 +814,7 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
}
String converted = OpenSSLCipherConfigurationParser.jsseToOpenSSL(cipherSuite);
if (!AVAILABLE_CIPHER_SUITES.contains(cipherSuite)) {
- logger.debug(sm.getString("engine.unsupportedCipher", cipherSuite, converted));
+ log.debug(sm.getString("engine.unsupportedCipher", cipherSuite, converted));
}
if (converted != null) {
cipherSuite = converted;
@@ -1022,8 +1022,8 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
}
MemoryAddress protocolAddress = MemoryAccess.getAddress(protocolPointer);
byte[] name = protocolAddress.asSegment(length, scope).toByteArray();
- if (logger.isDebugEnabled()) {
- logger.debug("Protocol negotiated [" + new String(name) + "]");
+ if (log.isDebugEnabled()) {
+ log.debug("Protocol negotiated [" + new String(name) + "]");
}
return new String(name);
}
@@ -1051,8 +1051,8 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
}
private synchronized void renegotiate() throws SSLException {
- if (logger.isDebugEnabled()) {
- logger.debug("Start renegotiate");
+ if (log.isDebugEnabled()) {
+ log.debug("Start renegotiate");
}
clearLastError();
int code;
@@ -1117,8 +1117,8 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
if (sslError == null) {
sslError = err;
}
- if (logger.isDebugEnabled()) {
- logger.debug(sm.getString("engine.openSSLError", Long.toString(error), err));
+ if (log.isDebugEnabled()) {
+ log.debug(sm.getString("engine.openSSLError", Long.toString(error), err));
}
} while ((error = ERR_get_error()) != SSL_ERROR_NONE());
}
@@ -1277,7 +1277,7 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
public static void openSSLCallbackInfo(MemoryAddress ssl, int where, int ret) {
EngineState state = getState(ssl);
if (state == null) {
- logger.warn(sm.getString("engine.noSSL", Long.valueOf(ssl.toRawLongValue())));
+ log.warn(sm.getString("engine.noSSL", Long.valueOf(ssl.toRawLongValue())));
return;
}
if (0 != (where & SSL_CB_HANDSHAKE_DONE())) {
@@ -1289,11 +1289,11 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
MemoryAddress ssl = X509_STORE_CTX_get_ex_data(x509ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
EngineState state = getState(ssl);
if (state == null) {
- logger.warn(sm.getString("engine.noSSL", Long.valueOf(ssl.toRawLongValue())));
+ log.warn(sm.getString("engine.noSSL", Long.valueOf(ssl.toRawLongValue())));
return 0;
}
- if (logger.isDebugEnabled()) {
- logger.debug("Verification in engine with mode [" + state.certificateVerifyMode + "] for " + state.ssl);
+ if (log.isDebugEnabled()) {
+ log.debug("Verification in engine with mode [" + state.certificateVerifyMode + "] for " + state.ssl);
}
int ok = preverify_ok;
int errnum = X509_STORE_CTX_get_error(x509ctx);
@@ -1396,7 +1396,7 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
try {
parseOCSPURLs(parser, urls);
} catch (Exception e) {
- logger.error(sm.getString("engine.ocspParseError"), e);
+ log.error(sm.getString("engine.ocspParseError"), e);
}
if (!urls.isEmpty()) {
// Use OpenSSL to build OCSP request
@@ -1404,11 +1404,11 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
try {
URL url = new URL(urlString);
ocspResponse = processOCSPRequest(url, issuer, x509, x509ctx, scope);
- if (logger.isDebugEnabled()) {
- logger.debug("OCSP response for URL: " + urlString + " was " + ocspResponse);
+ if (log.isDebugEnabled()) {
+ log.debug("OCSP response for URL: " + urlString + " was " + ocspResponse);
}
} catch (MalformedURLException e) {
- logger.warn(sm.getString("engine.invalidOCSPURL", urlString));
+ log.warn(sm.getString("engine.invalidOCSPURL", urlString));
}
if (ocspResponse != V_OCSP_CERTSTATUS_UNKNOWN()) {
break;
@@ -1523,7 +1523,7 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
}
}
} catch (Exception e) {
- logger.warn(sm.getString("engine.ocspRequestError", url.toString()), e);
+ log.warn(sm.getString("engine.ocspRequestError", url.toString()), e);
} finally {
if (MemoryAddress.NULL.equals(ocspResponse)) {
// Failed to get a valid response
@@ -1858,7 +1858,6 @@ public final class OpenSSLEngine extends SSLEngine implements SSLUtil.ProtocolIn
private static class EngineState implements Runnable {
- // FIXME: MemorySegment is supposed to be used but creates GC roots to the implicit scope
private final MemoryAddress ssl;
private final MemoryAddress networkBIO;
private final int certificateVerificationDepth;
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org
For additional commands, e-mail: dev-help@tomcat.apache.org