Author: dvaleri Date: Thu Jun 21 14:20:49 2012 New Revision: 1352541 URL: http://svn.apache.org/viewvc?rev=1352541&view=rev Log: [CAMEL-5310] Added some optimizations around choice log statements.
Modified: camel/trunk/camel-core/src/main/java/org/apache/camel/util/jsse/BaseSSLContextParameters.java Modified: camel/trunk/camel-core/src/main/java/org/apache/camel/util/jsse/BaseSSLContextParameters.java URL: http://svn.apache.org/viewvc/camel/trunk/camel-core/src/main/java/org/apache/camel/util/jsse/BaseSSLContextParameters.java?rev=1352541&r1=1352540&r2=1352541&view=diff ============================================================================== --- camel/trunk/camel-core/src/main/java/org/apache/camel/util/jsse/BaseSSLContextParameters.java (original) +++ camel/trunk/camel-core/src/main/java/org/apache/camel/util/jsse/BaseSSLContextParameters.java Thu Jun 21 14:20:49 2012 @@ -68,6 +68,20 @@ public abstract class BaseSSLContextPara private static final Logger LOG = LoggerFactory.getLogger(BaseSSLContextParameters.class); + private static final String LS = System.getProperty("line.separator"); + + private static final String SSL_ENGINE_CIPHER_SUITE_LOG_MSG = createCipherSuiteLogMessage("SSLEngine"); + + private static final String SSL_SOCKET_CIPHER_SUITE_LOG_MSG = createCipherSuiteLogMessage("SSLSocket"); + + private static final String SSL_SERVER_SOCKET_CIPHER_SUITE_LOG_MSG = createCipherSuiteLogMessage("SSLServerSocket"); + + private static final String SSL_ENGINE_PROTOCOL_LOG_MSG = createProtocolLogMessage("SSLEngine"); + + private static final String SSL_SOCKET_PROTOCOL_LOG_MSG = createProtocolLogMessage("SSLSocket"); + + private static final String SSL_SERVER_SOCKET_PROTOCOL_LOG_MSG = createProtocolLogMessage("SSLServerSocket"); + /** * The optional explicitly configured cipher suites for this configuration. */ @@ -326,20 +340,16 @@ public abstract class BaseSSLContextPara enabledCipherSuitePatterns, defaultEnabledCipherSuitePatterns, !allowPassthrough); - LOG.debug("Configuring SSLEngine [{}] with " - + "\r\n\t explicitly set cipher suites [{}]," - + "\r\n\t cipher suite patterns [{}]," - + "\r\n\t available cipher suites [{}]," - + "\r\n\t currently enabled cipher suites [{}]," - + "\r\n\t and default cipher suite patterns [{}]." - + "\r\n\t Resulting enabled cipher suites are [{}].", - new Object[] {engine, - enabledCipherSuites, - enabledCipherSuitePatterns, - engine.getSSLParameters().getCipherSuites(), - engine.getEnabledCipherSuites(), - defaultEnabledCipherSuitePatterns, - filteredCipherSuites}); + if (LOG.isDebugEnabled()) { + LOG.debug(SSL_ENGINE_CIPHER_SUITE_LOG_MSG, + new Object[] {engine, + enabledCipherSuites, + enabledCipherSuitePatterns, + engine.getSSLParameters().getCipherSuites(), + engine.getEnabledCipherSuites(), + defaultEnabledCipherSuitePatterns, + filteredCipherSuites}); + } engine.setEnabledCipherSuites(filteredCipherSuites.toArray(new String[filteredCipherSuites.size()])); @@ -349,20 +359,16 @@ public abstract class BaseSSLContextPara enabledSecureSocketProtocolsPatterns, defaultEnabledSecureSocketProtocolsPatterns, !allowPassthrough); - LOG.debug("Configuring SSLEngine [{}] with " - + "\r\n\t explicitly set protocols [{}]," - + "\r\n\t protocol patterns [{}]," - + "\r\n\t available protocols [{}]," - + "\r\n\t currently enabled protocols [{}]," - + "\r\n\t and default protocol patterns [{}]." - + "\r\n\t Resulting enabled protocols are [{}].", - new Object[] {engine, - enabledSecureSocketProtocols, - enabledSecureSocketProtocolsPatterns, - engine.getSSLParameters().getProtocols(), - engine.getEnabledProtocols(), - defaultEnabledSecureSocketProtocolsPatterns, - filteredSecureSocketProtocols}); + if (LOG.isDebugEnabled()) { + LOG.debug(SSL_ENGINE_PROTOCOL_LOG_MSG, + new Object[] {engine, + enabledSecureSocketProtocols, + enabledSecureSocketProtocolsPatterns, + engine.getSSLParameters().getProtocols(), + engine.getEnabledProtocols(), + defaultEnabledSecureSocketProtocolsPatterns, + filteredSecureSocketProtocols}); + } engine.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new String[filteredSecureSocketProtocols.size()])); @@ -511,21 +517,16 @@ public abstract class BaseSSLContextPara Arrays.asList(socket.getEnabledCipherSuites()), enabledCipherSuitePatterns, defaultEnabledCipherSuitePatterns, !allowPassthrough); - - LOG.debug("Configuring SSLSocket [{}] with " - + "\r\n\t explicitly set cipher suites [{}]," - + "\r\n\t cipher suite patterns [{}]," - + "\r\n\t available cipher suites [{}]," - + "\r\n\t currently enabled cipher suites [{}]," - + "\r\n\t and default cipher suite patterns [{}]." - + "\r\n\t Resulting enabled cipher suites are [{}].", - new Object[] {socket, - enabledCipherSuites, - enabledCipherSuitePatterns, - socket.getSSLParameters().getCipherSuites(), - socket.getEnabledCipherSuites(), - defaultEnabledCipherSuitePatterns, - filteredCipherSuites}); + if (LOG.isDebugEnabled()) { + LOG.debug(SSL_SOCKET_CIPHER_SUITE_LOG_MSG, + new Object[] {socket, + enabledCipherSuites, + enabledCipherSuitePatterns, + socket.getSSLParameters().getCipherSuites(), + socket.getEnabledCipherSuites(), + defaultEnabledCipherSuitePatterns, + filteredCipherSuites}); + } socket.setEnabledCipherSuites(filteredCipherSuites.toArray(new String[filteredCipherSuites.size()])); @@ -535,20 +536,16 @@ public abstract class BaseSSLContextPara enabledSecureSocketProtocolsPatterns, defaultEnabledSecureSocketProtocolsPatterns, !allowPassthrough); - LOG.debug("Configuring SSLSocket [{}] with " - + "\r\n\t explicitly set protocols [{}]," - + "\r\n\t protocol patterns [{}]," - + "\r\n\t available protocols [{}]," - + "\r\n\t currently enabled protocols [{}]," - + "\r\n\t and default protocol patterns [{}]." - + "\r\n\t Resulting enabled protocols are [{}].", - new Object[] {socket, - enabledSecureSocketProtocols, - enabledSecureSocketProtocolsPatterns, - socket.getSSLParameters().getProtocols(), - socket.getEnabledProtocols(), - defaultEnabledSecureSocketProtocolsPatterns, - filteredSecureSocketProtocols}); + if (LOG.isDebugEnabled()) { + LOG.debug(SSL_SOCKET_PROTOCOL_LOG_MSG, + new Object[] {socket, + enabledSecureSocketProtocols, + enabledSecureSocketProtocolsPatterns, + socket.getSSLParameters().getProtocols(), + socket.getEnabledProtocols(), + defaultEnabledSecureSocketProtocolsPatterns, + filteredSecureSocketProtocols}); + } socket.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new String[filteredSecureSocketProtocols.size()])); return socket; @@ -620,20 +617,16 @@ public abstract class BaseSSLContextPara enabledCipherSuitePatterns, defaultEnabledCipherSuitePatterns, !allowPassthrough); - LOG.debug("Configuring SSLServerSocket [{}] with " - + "\r\n\t explicitly set cipher suites [{}]," - + "\r\n\t cipher suite patterns [{}]," - + "\r\n\t available cipher suites [{}]," - + "\r\n\t currently enabled cipher suites [{}]," - + "\r\n\t and default cipher suite patterns [{}]." - + "\r\n\t Resulting enabled cipher suites are [{}].", - new Object[] {socket, - enabledCipherSuites, - enabledCipherSuitePatterns, - socket.getSupportedCipherSuites(), - socket.getEnabledCipherSuites(), - defaultEnabledCipherSuitePatterns, - filteredCipherSuites}); + if (LOG.isDebugEnabled()) { + LOG.debug(SSL_SERVER_SOCKET_CIPHER_SUITE_LOG_MSG, + new Object[] {socket, + enabledCipherSuites, + enabledCipherSuitePatterns, + socket.getSupportedCipherSuites(), + socket.getEnabledCipherSuites(), + defaultEnabledCipherSuitePatterns, + filteredCipherSuites}); + } socket.setEnabledCipherSuites(filteredCipherSuites.toArray(new String[filteredCipherSuites.size()])); @@ -643,20 +636,16 @@ public abstract class BaseSSLContextPara enabledSecureSocketProtocolsPatterns, defaultEnabledSecureSocketProtocolsPatterns, !allowPassthrough); - LOG.debug("Configuring SSLServerSocket [{}] with " - + "\r\n\t explicitly set protocols [{}]," - + "\r\n\t protocol patterns [{}]," - + "\r\n\t available protocols [{}]," - + "\r\n\t currently enabled protocols [{}]," - + "\r\n\t and default protocol patterns [{}]." - + "\r\n\t Resulting enabled protocols are [{}].", - new Object[] {socket, - enabledSecureSocketProtocols, - enabledSecureSocketProtocolsPatterns, - socket.getSupportedProtocols(), - socket.getEnabledProtocols(), - defaultEnabledSecureSocketProtocolsPatterns, - filteredSecureSocketProtocols}); + if (LOG.isDebugEnabled()) { + LOG.debug(SSL_SERVER_SOCKET_PROTOCOL_LOG_MSG, + new Object[] {socket, + enabledSecureSocketProtocols, + enabledSecureSocketProtocolsPatterns, + socket.getSupportedProtocols(), + socket.getEnabledProtocols(), + defaultEnabledSecureSocketProtocolsPatterns, + filteredSecureSocketProtocols}); + } socket.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new String[filteredSecureSocketProtocols.size()])); return socket; @@ -1113,4 +1102,23 @@ public abstract class BaseSSLContextPara } } + private static String createCipherSuiteLogMessage(String entityName) { + return "Configuring " + entityName + " [{}] with " + LS + + "\t explicitly set cipher suites [{}]," + LS + + "\t cipher suite patterns [{}]," + LS + + "\t available cipher suites [{}]," + LS + + "\t currently enabled cipher suites [{}]," + LS + + "\t and default cipher suite patterns [{}]." + LS + + "\t Resulting enabled cipher suites are [{}]."; + } + + private static String createProtocolLogMessage(String entityName) { + return "Configuring " + entityName + " [{}] with " + LS + + "\t explicitly set protocols [{}]," + LS + + "\t protocol patterns [{}]," + LS + + "\t available protocols [{}]," + LS + + "\t currently enabled protocols [{}]," + LS + + "\t and default protocol patterns [{}]." + LS + + "\t Resulting enabled protocols are [{}]."; + } }