Martin Peřina has uploaded a new change for review. Change subject: core: Replace oVirt logger with slf4j in aaa ......................................................................
core: Replace oVirt logger with slf4j in aaa Replaces oVirt logger with slf4j in aaa module. Change-Id: Ic51dce32ddfd2453dbb0d143b8ca83ae76663b8b Bug-Url: https://bugzilla.redhat.com/1109871 Signed-off-by: Martin Perina <mper...@redhat.com> --- M backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/DbUserCacheManager.java M backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/LoginBaseCommand.java M backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/SyncUsers.java M backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/ValidateSessionQuery.java 4 files changed, 38 insertions(+), 55 deletions(-) git pull ssh://gerrit.ovirt.org:29418/ovirt-engine refs/changes/19/34219/1 diff --git a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/DbUserCacheManager.java b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/DbUserCacheManager.java index 7e6d021..7aed7a7 100644 --- a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/DbUserCacheManager.java +++ b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/DbUserCacheManager.java @@ -11,13 +11,13 @@ import org.ovirt.engine.core.common.config.Config; import org.ovirt.engine.core.common.config.ConfigValues; import org.ovirt.engine.core.dal.dbbroker.DbFacade; -import org.ovirt.engine.core.utils.log.Log; -import org.ovirt.engine.core.utils.log.LogFactory; import org.ovirt.engine.core.utils.timer.OnTimerMethodAnnotation; import org.ovirt.engine.core.utils.timer.SchedulerUtilQuartzImpl; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; public class DbUserCacheManager { - private static final Log log = LogFactory.getLog(DbUserCacheManager.class); + private static final Logger log = LoggerFactory.getLogger(DbUserCacheManager.class); private static final DbUserCacheManager _instance = new DbUserCacheManager(); private boolean initialized = false; private final Map<String, DbGroup> groupsMap = new HashMap<>(); @@ -31,7 +31,7 @@ public void init() { if (!initialized) { - log.info("Start initializing " + getClass().getSimpleName()); + log.info("Start initializing {}", getClass().getSimpleName()); int mRefreshRate = Config.<Integer> getValue(ConfigValues.UserRefreshRate); SchedulerUtilQuartzImpl.getInstance().scheduleAFixedDelayJob( @@ -44,7 +44,7 @@ TimeUnit.SECONDS ); initialized = true; - log.info("Finished initializing " + getClass().getSimpleName()); + log.info("Finished initializing {}", getClass().getSimpleName()); } } diff --git a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/LoginBaseCommand.java b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/LoginBaseCommand.java index eeef75e..2ce33cc 100644 --- a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/LoginBaseCommand.java +++ b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/LoginBaseCommand.java @@ -38,12 +38,12 @@ import org.ovirt.engine.core.dal.dbbroker.auditloghandling.AuditLogDirector; import org.ovirt.engine.core.dal.dbbroker.auditloghandling.AuditLogableBase; import org.ovirt.engine.core.extensions.mgr.ExtensionProxy; -import org.ovirt.engine.core.utils.log.Log; -import org.ovirt.engine.core.utils.log.LogFactory; import org.ovirt.engine.core.utils.threadpool.ThreadPoolUtil; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; public abstract class LoginBaseCommand<T extends LoginUserParameters> extends CommandBase<T> { - protected static final Log log = LogFactory.getLog(LoginBaseCommand.class); + protected static final Logger log = LoggerFactory.getLogger(LoginBaseCommand.class); private static final Map<Integer, AuditLogType> auditLogMap = new HashMap<>(); private static final Map<Integer, VdcBllMessages> vdcBllMessagesMap = new HashMap<>(); @@ -136,8 +136,9 @@ validTo = fromExtension; } } catch (ParseException e) { - log.warn("Error parsing AuthRecord.VALID_TO . Default VALID_TO value will be set on session"); - log.debug("Exception is ", e); + log.warn("Error parsing AuthRecord.VALID_TO. Default VALID_TO value will be set on session: {}", + e.getMessage()); + log.debug("Exception", e); } } SessionDataContainer.getInstance().setHardLimit(engineSessionId, validTo); @@ -147,10 +148,8 @@ protected boolean isUserCanBeAuthenticated() { AuthenticationProfile profile = AuthenticationProfileRepository.getInstance().getProfile(getParameters().getProfileName()); if (profile == null) { - log.errorFormat( - "Can't login because authentication profile \"{1}\" doesn't exist.", - getParameters().getProfileName() - ); + log.error("Can't login because authentication profile '{}' doesn't exist.", + getParameters().getProfileName()); addCanDoActionMessage(VdcBllMessages.USER_FAILED_TO_AUTHENTICATE); return false; } @@ -170,28 +169,21 @@ // Verify that the login name and password have been provided: loginName = getParameters().getLoginName(); if (loginName == null) { - log.errorFormat( - "Can't login user because no login name has been provided." - ); + log.error("Can't login user because no login name has been provided."); addCanDoActionMessage(VdcBllMessages.USER_FAILED_TO_AUTHENTICATE); return false; } String password = getParameters().getPassword(); if (password == null) { - log.errorFormat( - "Can't login user \"{0}\" because no password has been provided.", - loginName - ); + log.error("Can't login user '{}' because no password has been provided.", loginName); return false; } if (!AuthzUtils.supportsPasswordAuthentication(authnExtension)) { - log.errorFormat( - "Can't login user \"{0}\" because the authentication profile \"{1}\" doesn't support password " - + - "authentication.", - loginName, profile.getName() - ); + log.error("Can't login user '{}' because the authentication profile '{}' doesn't support password" + + " authentication.", + loginName, + profile.getName()); addCanDoActionMessage(VdcBllMessages.USER_FAILED_TO_AUTHENTICATE); return false; } @@ -236,13 +228,10 @@ ExtMap principalRecord = AuthzUtils.fetchPrincipalRecord(profile.getAuthz(), authRecord); if (principalRecord == null) { - log.infoFormat( - "Can't login user \"{0}\" with authentication profile \"{1}\" because the user doesn't exist in the " - + - "directory.", + log.info("Can't login user '{}' with authentication profile '{}' because the user doesn't exist in the" + + " directory.", authRecord.<String> get(Authn.AuthRecord.PRINCIPAL), - profile.getName() - ); + profile.getName()); addCanDoActionMessage(VdcBllMessages.USER_MUST_EXIST_IN_DIRECTORY); AcctUtils.reportRecords( Acct.ReportReason.PRINCIPAL_NOT_FOUND, @@ -260,11 +249,9 @@ DbUser dbUser = DirectoryUtils.mapPrincipalRecordToDbUser(AuthzUtils.getName(profile.getAuthz()), principalRecord); if (!dbUser.isActive()) { dbUser.setActive(true); - log.info( - String.format("The user %1$s was reactivated as it was found in authz provider %2$s during login attempt.", + log.info("The user '{}' was reactivated as it was found in authz provider '{}' during login attempt.", dbUser.getLoginName(), - dbUser.getDomain()) - ); + dbUser.getDomain()); } getDbUserDAO().saveOrUpdate(dbUser); @@ -295,7 +282,7 @@ // This may be redundant in some use-cases, but looking forward to Single Sign On, // we will want this info boolean isAdmin = MultiLevelAdministrationHandler.isAdminUser(dbUser); - log.debugFormat("Checking if user {0} is an admin, result {1}", dbUser.getLoginName(), isAdmin); + log.debug("Checking if user '{}' is an admin, result {}", dbUser.getLoginName(), isAdmin); dbUser.setAdmin(isAdmin); setCurrentUser(dbUser); AcctUtils.reportRecords( @@ -319,9 +306,7 @@ @Override protected boolean isUserAuthorizedToRunAction() { - if (log.isDebugEnabled()) { - log.debug("IsUserAutorizedToRunAction: login - no permission check"); - } + log.debug("IsUserAutorizedToRunAction: login - no permission check"); return true; } @@ -382,8 +367,7 @@ int authResult = outputMap.<Integer>get(Authn.InvokeKeys.RESULT); if (authResult != Authn.AuthResult.SUCCESS) { - log.infoFormat( - "Can't login user \"{0}\" with authentication profile \"{1}\" because the authentication failed.", + log.info("Can't login user '{}' with authentication profile '{}' because the authentication failed.", user, getParameters().getProfileName()); diff --git a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/SyncUsers.java b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/SyncUsers.java index 5102145..39261ed 100644 --- a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/SyncUsers.java +++ b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/SyncUsers.java @@ -14,12 +14,12 @@ import org.ovirt.engine.core.extensions.mgr.ExtensionProxy; import org.ovirt.engine.core.utils.collections.MultiValueMapUtils; import org.ovirt.engine.core.utils.extensionsmgr.EngineExtensionsManager; -import org.ovirt.engine.core.utils.log.Log; -import org.ovirt.engine.core.utils.log.LogFactory; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; public class SyncUsers { - private static final Log log = LogFactory.getLog(SyncUsers.class); + private static final Logger log = LoggerFactory.getLogger(SyncUsers.class); public static DbUser sync(DbUser dbUser) { List<DbUser> synchedUsers = sync(Arrays.asList(dbUser)); @@ -63,13 +63,13 @@ if (!activeUser.equals(dbUser)) { activeUser.setId(dbUser.getId()); activeUser.setAdmin(dbUser.isAdmin()); - log.infoFormat("Principal {0}::{1} synchronized", + log.info("Principal {}::{} synchronized", activeUser.getLoginName(), activeUser.getDomain()); usersToUpdate.add(activeUser); } } else { - log.infoFormat("Deactivating non existing principal {0}::{1}", + log.info("Deactivating non existing principal {}::{}", dbUser.getLoginName(), dbUser.getDomain()); dbUser.setActive(false); @@ -77,9 +77,9 @@ } } } catch (Exception ex) { - log.errorFormat("Error during user synchronization of extension {0}. Exception message is {1}", + log.error("Error during user synchronization of extension '{}': {}", authz, ex.getMessage()); - log.debug("", ex); + log.debug("Exception", ex); } } return usersToUpdate; diff --git a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/ValidateSessionQuery.java b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/ValidateSessionQuery.java index 406a51e..cc38f45 100644 --- a/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/ValidateSessionQuery.java +++ b/backend/manager/modules/bll/src/main/java/org/ovirt/engine/core/bll/aaa/ValidateSessionQuery.java @@ -3,13 +3,14 @@ import org.ovirt.engine.core.bll.QueriesCommandBase; import org.ovirt.engine.core.common.businessentities.aaa.DbUser; import org.ovirt.engine.core.common.queries.VdcQueryParametersBase; -import org.ovirt.engine.core.utils.log.Log; -import org.ovirt.engine.core.utils.log.LogFactory; +import org.slf4j.Logger; +import org.slf4j.LoggerFactory; /* * This query validates the session, returning the user which is logged in this session. */ public class ValidateSessionQuery<P extends VdcQueryParametersBase> extends QueriesCommandBase<P> { + private final static Logger log = LoggerFactory.getLogger(ValidateSessionQuery.class); public ValidateSessionQuery(P parameters) { super(parameters); @@ -24,7 +25,7 @@ private void validateSession(String sessionID) { getQueryReturnValue().setSucceeded(false); if (sessionID != null) { - log.debug("Input session ID is: " + sessionID); + log.debug("Input session ID is '{}'", sessionID); DbUser user = (DbUser) getSessionUser(sessionID); if (user != null) { log.debug("Found session user"); @@ -40,6 +41,4 @@ protected Object getSessionUser(String sessionID) { return SessionDataContainer.getInstance().getUser(sessionID, false); } - - private final static Log log = LogFactory.getLog(ValidateSessionQuery.class); } -- To view, visit http://gerrit.ovirt.org/34219 To unsubscribe, visit http://gerrit.ovirt.org/settings Gerrit-MessageType: newchange Gerrit-Change-Id: Ic51dce32ddfd2453dbb0d143b8ca83ae76663b8b Gerrit-PatchSet: 1 Gerrit-Project: ovirt-engine Gerrit-Branch: master Gerrit-Owner: Martin Peřina <mper...@redhat.com> _______________________________________________ Engine-patches mailing list Engine-patches@ovirt.org http://lists.ovirt.org/mailman/listinfo/engine-patches