fix logging warn level
git-svn-id: https://svn.apache.org/repos/asf/archiva/redback/redback-core/trunk@1546883 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
4c65d80ad5
commit
cfcc2b4d8b
|
@ -198,7 +198,7 @@ public class LdapBindAuthenticator
|
||||||
}
|
}
|
||||||
catch ( NamingException e )
|
catch ( NamingException e )
|
||||||
{
|
{
|
||||||
log.warn( "skip exception closing naming search result " + e.getMessage() );
|
log.warn( "skip exception closing naming search result {}", e.getMessage() );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -77,7 +77,7 @@ public class UserConfigurableJdoFactory
|
||||||
catch ( InterpolationException e )
|
catch ( InterpolationException e )
|
||||||
{
|
{
|
||||||
// ignore interpolation issue
|
// ignore interpolation issue
|
||||||
log.warn( "skip issue during interpolation " + e.getMessage() );
|
log.warn( "skip issue during interpolation {}", e.getMessage() );
|
||||||
return value;
|
return value;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -129,7 +129,7 @@ public class DefaultUserConfiguration
|
||||||
}
|
}
|
||||||
catch ( EvaluatorException e )
|
catch ( EvaluatorException e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to resolve configuration name: " + e.getMessage(), e );
|
log.warn( "Unable to resolve configuration name: {}", e.getMessage(), e );
|
||||||
}
|
}
|
||||||
log.info( "Attempting to find configuration [{}] (resolved to [{}])", configName, configName );
|
log.info( "Attempting to find configuration [{}] (resolved to [{}])", configName, configName );
|
||||||
|
|
||||||
|
|
|
@ -107,7 +107,7 @@ public class LockedAdminEnvironmentCheck
|
||||||
}
|
}
|
||||||
catch ( RbacManagerException e )
|
catch ( RbacManagerException e )
|
||||||
{
|
{
|
||||||
log.warn( "Exception when checking for locked admin user: " + e.getMessage(), e );
|
log.warn( "Exception when checking for locked admin user: {}", e.getMessage(), e );
|
||||||
}
|
}
|
||||||
|
|
||||||
checked = true;
|
checked = true;
|
||||||
|
|
|
@ -93,7 +93,7 @@ public class MailerImpl
|
||||||
{
|
{
|
||||||
if ( recipients.isEmpty() )
|
if ( recipients.isEmpty() )
|
||||||
{
|
{
|
||||||
log.warn( "Mail Not Sent - No mail recipients for email. subject [" + subject + "]" );
|
log.warn( "Mail Not Sent - No mail recipients for email. subject [{}]", subject );
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -407,7 +407,7 @@ public class DefaultRoleManagementService
|
||||||
}
|
}
|
||||||
catch ( UserNotFoundException e )
|
catch ( UserNotFoundException e )
|
||||||
{
|
{
|
||||||
log.warn( "User '" + userAssignment.getPrincipal() + "' doesn't exist.", e );
|
log.warn( "User '{}' doesn't exist.", userAssignment.getPrincipal(), e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -428,7 +428,7 @@ public class DefaultRoleManagementService
|
||||||
}
|
}
|
||||||
catch ( UserNotFoundException e )
|
catch ( UserNotFoundException e )
|
||||||
{
|
{
|
||||||
log.warn( "User '" + userAssignment.getPrincipal() + "' doesn't exist.", e );
|
log.warn( "User '{}' doesn't exist.", userAssignment.getPrincipal(), e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -80,7 +80,7 @@ public abstract class AbstractRBACManager
|
||||||
}
|
}
|
||||||
catch ( Exception e )
|
catch ( Exception e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to trigger .rbacInit( boolean ) to " + listener.getClass().getName(), e );
|
log.warn( "Unable to trigger .rbacInit( boolean ) to {}", listener.getClass().getName(), e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -95,7 +95,7 @@ public abstract class AbstractRBACManager
|
||||||
}
|
}
|
||||||
catch ( Exception e )
|
catch ( Exception e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to trigger .rbacRoleSaved( Role ) to " + listener.getClass().getName(), e );
|
log.warn( "Unable to trigger .rbacRoleSaved( Role ) to {}", listener.getClass().getName(), e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -110,7 +110,7 @@ public abstract class AbstractRBACManager
|
||||||
}
|
}
|
||||||
catch ( Exception e )
|
catch ( Exception e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to trigger .rbacRoleRemoved( Role ) to " + listener.getClass().getName(), e );
|
log.warn( "Unable to trigger .rbacRoleRemoved( Role ) to {}", listener.getClass().getName(), e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -125,7 +125,7 @@ public abstract class AbstractRBACManager
|
||||||
}
|
}
|
||||||
catch ( Exception e )
|
catch ( Exception e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to trigger .rbacPermissionSaved( Permission ) to " + listener.getClass().getName(),
|
log.warn( "Unable to trigger .rbacPermissionSaved( Permission ) to {}", listener.getClass().getName(),
|
||||||
e );
|
e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -141,7 +141,7 @@ public abstract class AbstractRBACManager
|
||||||
}
|
}
|
||||||
catch ( Exception e )
|
catch ( Exception e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to trigger .rbacPermissionRemoved( Permission ) to " + listener.getClass().getName(),
|
log.warn( "Unable to trigger .rbacPermissionRemoved( Permission ) to {}", listener.getClass().getName(),
|
||||||
e );
|
e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -158,7 +158,7 @@ public abstract class AbstractRBACManager
|
||||||
catch ( Exception e )
|
catch ( Exception e )
|
||||||
{
|
{
|
||||||
log.warn(
|
log.warn(
|
||||||
"Unable to trigger .rbacUserAssignmentSaved( UserAssignment ) to " + listener.getClass().getName(),
|
"Unable to trigger .rbacUserAssignmentSaved( UserAssignment ) to {}", listener.getClass().getName(),
|
||||||
e );
|
e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -174,8 +174,8 @@ public abstract class AbstractRBACManager
|
||||||
}
|
}
|
||||||
catch ( Exception e )
|
catch ( Exception e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to trigger .rbacUserAssignmentRemoved( UserAssignment ) to "
|
log.warn( "Unable to trigger .rbacUserAssignmentRemoved( UserAssignment ) to {}",
|
||||||
+ listener.getClass().getName(), e );
|
listener.getClass().getName(), e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -594,7 +594,7 @@ public abstract class AbstractRBACManager
|
||||||
{
|
{
|
||||||
// the client application might not manage role clean up totally correctly so we want to notify
|
// the client application might not manage role clean up totally correctly so we want to notify
|
||||||
// of a child role issue and offer a clean up process at some point
|
// of a child role issue and offer a clean up process at some point
|
||||||
log.warn( "dangling child role: " + roleName + " on " + role.getName() );
|
log.warn( "dangling child role: {} on {}", roleName, role.getName() );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -261,7 +261,7 @@ public class JdoUserManager
|
||||||
}
|
}
|
||||||
catch ( UserNotFoundException e )
|
catch ( UserNotFoundException e )
|
||||||
{
|
{
|
||||||
log.warn( "Unable to delete user " + username + ", user not found.", e );
|
log.warn( "Unable to delete user {}, user not found.", username, e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -440,7 +440,7 @@ public class LdapUserManager
|
||||||
}
|
}
|
||||||
catch ( LdapControllerException e )
|
catch ( LdapControllerException e )
|
||||||
{
|
{
|
||||||
log.warn( "Failed to search for user: " + principal, e );
|
log.warn( "Failed to search for user: {}", principal, e );
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
catch ( LdapException e )
|
catch ( LdapException e )
|
||||||
|
@ -462,7 +462,7 @@ public class LdapUserManager
|
||||||
}
|
}
|
||||||
catch ( LdapException e )
|
catch ( LdapException e )
|
||||||
{
|
{
|
||||||
log.warn( "failed to get a ldap connection " + e.getMessage(), e );
|
log.warn( "failed to get a ldap connection {}", e.getMessage(), e );
|
||||||
throw new LdapException( "failed to get a ldap connection " + e.getMessage(), e );
|
throw new LdapException( "failed to get a ldap connection " + e.getMessage(), e );
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue