-
-
Couldn't load subscription status.
- Fork 3.7k
redo of #10865 with uppercase LOG #10879
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
because we were inconsistent here
and stricter enforcement of @DiscriminatorValue requirement (I don't think this is a substantive change to behavior, but it might be).
|
Thanks for your pull request! This pull request does not follow the contribution rules. Could you have a look? ❌ All commit messages should start with a JIRA issue key matching pattern › This message was automatically generated. |
| if ( log.isTraceEnabled() ) { | ||
| log.tracef( "Performing JAXB binding of hbm.xml document: %s", origin.toString() ); | ||
| if ( LOG.isTraceEnabled() ) { | ||
| LOG.tracef( "Performing JAXB binding of hbm.xml document: %s", origin.toString() ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| assert "entity-mappings".equals( rootElementLocalName ); | ||
| try { | ||
| log.tracef( "Performing JAXB binding of orm.xml document: %s", origin.toString() ); | ||
| LOG.tracef( "Performing JAXB binding of orm.xml document: %s", origin.toString() ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| LOG.trace( "Collection dereferenced: " | ||
| + collectionInfoString( loadedPersister, collection, entry.getLoadedKey(), session ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| LOG.trace( "Found collection with unloaded owner: " | ||
| + collectionInfoString( loadedPersister, collection, loadedKey, session ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| if ( LOG.isDebugEnabled() ) { | ||
| final var persister = requireEntityPersister( entityName ); | ||
| log.tracef( "Initializing proxy: %s", infoString( persister, id, getFactory() ) ); | ||
| LOG.tracef( "Initializing proxy: %s", infoString( persister, id, getFactory() ) ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
| private static Reader toReader(File file, String charsetName) { | ||
| if ( ! file.exists() ) { | ||
| log.warnf( "Specified schema generation script file [%s] did not exist for reading", file ); | ||
| LOG.warnf( "Specified schema generation script file [%s] did not exist for reading", file ); |
Check failure
Code scanning / CodeQL
Insertion of sensitive information into log files High
potentially sensitive information
This
potentially sensitive information
This
potentially sensitive information
This
potentially sensitive information
This
@beikov expressed a preference for SHOUTYCASE, so I broke down and redid it that way just for him.
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license
and can be relicensed under the terms of the LGPL v2.1 license in the future at the maintainers' discretion.
For more information on licensing, please check here.