Skip to content

Conversation

@gavinking
Copy link
Member

@beikov expressed a preference for SHOUTYCASE, so I broke down and redid it that way just for him.


By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license
and can be relicensed under the terms of the LGPL v2.1 license in the future at the maintainers' discretion.
For more information on licensing, please check here.


@hibernate-github-bot
Copy link

Thanks for your pull request!

This pull request does not follow the contribution rules. Could you have a look?

❌ All commit messages should start with a JIRA issue key matching pattern HHH-\d+
    ↳ Offending commits: [dfb45cc, d5b5a76, 863272d, e0a7a4d, e835edf, f164ee8, 1394ce2]

› This message was automatically generated.

if ( log.isTraceEnabled() ) {
log.tracef( "Performing JAXB binding of hbm.xml document: %s", origin.toString() );
if ( LOG.isTraceEnabled() ) {
LOG.tracef( "Performing JAXB binding of hbm.xml document: %s", origin.toString() );

Check failure

Code scanning / CodeQL

Insertion of sensitive information into log files High

This
potentially sensitive information
is written to a log file.
assert "entity-mappings".equals( rootElementLocalName );
try {
log.tracef( "Performing JAXB binding of orm.xml document: %s", origin.toString() );
LOG.tracef( "Performing JAXB binding of orm.xml document: %s", origin.toString() );

Check failure

Code scanning / CodeQL

Insertion of sensitive information into log files High

This
potentially sensitive information
is written to a log file.
Comment on lines +52 to +53
LOG.trace( "Collection dereferenced: "
+ collectionInfoString( loadedPersister, collection, entry.getLoadedKey(), session ) );

Check failure

Code scanning / CodeQL

Insertion of sensitive information into log files High

This
potentially sensitive information
is written to a log file.
Comment on lines +118 to +119
LOG.trace( "Found collection with unloaded owner: "
+ collectionInfoString( loadedPersister, collection, loadedKey, session ) );

Check failure

Code scanning / CodeQL

Insertion of sensitive information into log files High

This
potentially sensitive information
is written to a log file.
if ( LOG.isDebugEnabled() ) {
final var persister = requireEntityPersister( entityName );
log.tracef( "Initializing proxy: %s", infoString( persister, id, getFactory() ) );
LOG.tracef( "Initializing proxy: %s", infoString( persister, id, getFactory() ) );

Check failure

Code scanning / CodeQL

Insertion of sensitive information into log files High

This
potentially sensitive information
is written to a log file.
private static Reader toReader(File file, String charsetName) {
if ( ! file.exists() ) {
log.warnf( "Specified schema generation script file [%s] did not exist for reading", file );
LOG.warnf( "Specified schema generation script file [%s] did not exist for reading", file );

Check failure

Code scanning / CodeQL

Insertion of sensitive information into log files High

This
potentially sensitive information
is written to a log file.
This
potentially sensitive information
is written to a log file.
This
potentially sensitive information
is written to a log file.
This
potentially sensitive information
is written to a log file.
This
potentially sensitive information
is written to a log file.
@gavinking gavinking marked this pull request as ready for review September 5, 2025 11:35
@gavinking gavinking merged commit 4fd814b into hibernate:main Sep 5, 2025
24 of 26 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant