Remove stack trace logging in Security(Transport|Http)ExceptionHandler (#45966)
As per #45852 comment we no longer need to log stack-traces in SecurityTransportExceptionHandler and SecurityHttpExceptionHandler even if trace logging is enabled. (cherry picked from commit c99224a32d26db985053b7b36e2049036e438f97)
This commit is contained in:
parent
f2bdd392e7
commit
ece9eb4acd
|
@ -6,7 +6,6 @@
|
|||
package org.elasticsearch.xpack.core.security.transport;
|
||||
|
||||
import org.apache.logging.log4j.Logger;
|
||||
import org.apache.logging.log4j.message.ParameterizedMessage;
|
||||
import org.elasticsearch.common.component.Lifecycle;
|
||||
import org.elasticsearch.common.network.CloseableChannel;
|
||||
import org.elasticsearch.transport.TcpChannel;
|
||||
|
@ -33,18 +32,10 @@ public final class SecurityTransportExceptionHandler implements BiConsumer<TcpCh
|
|||
logger.warn("received plaintext traffic on an encrypted channel, closing connection {}", channel);
|
||||
CloseableChannel.closeChannel(channel);
|
||||
} else if (SSLExceptionHelper.isCloseDuringHandshakeException(e)) {
|
||||
if (logger.isTraceEnabled()) {
|
||||
logger.trace(new ParameterizedMessage("connection {} closed during ssl handshake", channel), e);
|
||||
} else {
|
||||
logger.debug("connection {} closed during handshake", channel);
|
||||
}
|
||||
logger.debug("connection {} closed during handshake", channel);
|
||||
CloseableChannel.closeChannel(channel);
|
||||
} else if (SSLExceptionHelper.isReceivedCertificateUnknownException(e)) {
|
||||
if (logger.isTraceEnabled()) {
|
||||
logger.trace(new ParameterizedMessage("client did not trust server's certificate, closing connection {}", channel), e);
|
||||
} else {
|
||||
logger.warn("client did not trust this server's certificate, closing connection {}", channel);
|
||||
}
|
||||
logger.warn("client did not trust this server's certificate, closing connection {}", channel);
|
||||
CloseableChannel.closeChannel(channel);
|
||||
} else {
|
||||
fallback.accept(channel, e);
|
||||
|
|
|
@ -6,7 +6,6 @@
|
|||
package org.elasticsearch.xpack.security.transport;
|
||||
|
||||
import org.apache.logging.log4j.Logger;
|
||||
import org.apache.logging.log4j.message.ParameterizedMessage;
|
||||
import org.elasticsearch.common.component.Lifecycle;
|
||||
import org.elasticsearch.common.network.CloseableChannel;
|
||||
import org.elasticsearch.http.HttpChannel;
|
||||
|
@ -35,27 +34,13 @@ public final class SecurityHttpExceptionHandler implements BiConsumer<HttpChanne
|
|||
}
|
||||
|
||||
if (isNotSslRecordException(e)) {
|
||||
if (logger.isTraceEnabled()) {
|
||||
logger.trace(new ParameterizedMessage("received plaintext http traffic on an https channel, closing connection {}",
|
||||
channel), e);
|
||||
} else {
|
||||
logger.warn("received plaintext http traffic on an https channel, closing connection {}", channel);
|
||||
}
|
||||
logger.warn("received plaintext http traffic on an https channel, closing connection {}", channel);
|
||||
CloseableChannel.closeChannel(channel);
|
||||
} else if (isCloseDuringHandshakeException(e)) {
|
||||
if (logger.isTraceEnabled()) {
|
||||
logger.trace(new ParameterizedMessage("connection {} closed during ssl handshake", channel), e);
|
||||
} else {
|
||||
logger.debug("connection {} closed during ssl handshake", channel);
|
||||
}
|
||||
logger.debug("connection {} closed during ssl handshake", channel);
|
||||
CloseableChannel.closeChannel(channel);
|
||||
} else if (isReceivedCertificateUnknownException(e)) {
|
||||
if (logger.isTraceEnabled()) {
|
||||
logger.trace(new ParameterizedMessage("http client did not trust server's certificate, closing connection {}",
|
||||
channel), e);
|
||||
} else {
|
||||
logger.warn("http client did not trust this server's certificate, closing connection {}", channel);
|
||||
}
|
||||
logger.warn("http client did not trust this server's certificate, closing connection {}", channel);
|
||||
CloseableChannel.closeChannel(channel);
|
||||
} else {
|
||||
fallback.accept(channel, e);
|
||||
|
|
Loading…
Reference in New Issue