@@ -99,12 +99,12 @@ static SqlAuthenticationToken getSqlFedAuthToken(SqlFedAuthInfo fedAuthInfo, Str
9999 persistentTokenCacheAccessAspect = new PersistentTokenCacheAccessAspect ();
100100 TOKEN_CACHE_MAP .addEntry (hashedSecret , persistentTokenCacheAccessAspect );
101101
102- if (logger .isLoggable (Level .FINEST )) {
103- logger .finest (LOGCONTEXT + ": cache token for user: " + user );
102+ if (logger .isLoggable (Level .FINER )) {
103+ logger .finer (LOGCONTEXT + ": cache token for user: " + user );
104104 }
105105 } else {
106- if (logger .isLoggable (Level .FINEST )) {
107- logger .finest (LOGCONTEXT + ": retrieved cached token for user: " + user );
106+ if (logger .isLoggable (Level .FINER )) {
107+ logger .finer (LOGCONTEXT + ": retrieved cached token for user: " + user );
108108 }
109109 }
110110
@@ -118,8 +118,8 @@ static SqlAuthenticationToken getSqlFedAuthToken(SqlFedAuthInfo fedAuthInfo, Str
118118
119119 final IAuthenticationResult authenticationResult = future .get ();
120120
121- if (logger .isLoggable (Level .FINEST )) {
122- logger .finest (
121+ if (logger .isLoggable (Level .FINER )) {
122+ logger .finer (
123123 LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
124124 + ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
125125 }
@@ -165,12 +165,12 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipal(SqlFedAuthInfo fedAuth
165165 persistentTokenCacheAccessAspect = new PersistentTokenCacheAccessAspect ();
166166 TOKEN_CACHE_MAP .addEntry (hashedSecret , persistentTokenCacheAccessAspect );
167167
168- if (logger .isLoggable (Level .FINEST )) {
169- logger .finest (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
168+ if (logger .isLoggable (Level .FINER )) {
169+ logger .finer (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
170170 }
171171 } else {
172- if (logger .isLoggable (Level .FINEST )) {
173- logger .finest (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
172+ if (logger .isLoggable (Level .FINER )) {
173+ logger .finer (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
174174 }
175175 }
176176
@@ -183,8 +183,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipal(SqlFedAuthInfo fedAuth
183183 .acquireToken (ClientCredentialParameters .builder (scopes ).build ());
184184 final IAuthenticationResult authenticationResult = future .get ();
185185
186- if (logger .isLoggable (Level .FINEST )) {
187- logger .finest (
186+ if (logger .isLoggable (Level .FINER )) {
187+ logger .finer (
188188 LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
189189 + ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
190190 }
@@ -232,12 +232,12 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipalCertificate(SqlFedAuthI
232232 persistentTokenCacheAccessAspect = new PersistentTokenCacheAccessAspect ();
233233 TOKEN_CACHE_MAP .addEntry (hashedSecret , persistentTokenCacheAccessAspect );
234234
235- if (logger .isLoggable (Level .FINEST )) {
236- logger .finest (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
235+ if (logger .isLoggable (Level .FINER )) {
236+ logger .finer (LOGCONTEXT + ": cache token for principal id: " + aadPrincipalID );
237237 }
238238 } else {
239- if (logger .isLoggable (Level .FINEST )) {
240- logger .finest (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
239+ if (logger .isLoggable (Level .FINER )) {
240+ logger .finer (LOGCONTEXT + ": retrieved cached token for principal id: " + aadPrincipalID );
241241 }
242242 }
243243
@@ -270,21 +270,21 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipalCertificate(SqlFedAuthI
270270 0 , null );
271271 } catch (CertificateException | NoSuchAlgorithmException | IOException e ) {
272272 // ignore not PKCS12 cert error, will try another format after this
273- if (logger .isLoggable (Level .FINEST )) {
274- logger .finest (LOGCONTEXT + "Error loading PKCS12 certificate: " + e .getMessage ());
273+ if (logger .isLoggable (Level .FINER )) {
274+ logger .finer (LOGCONTEXT + "Error loading PKCS12 certificate: " + e .getMessage ());
275275 }
276276 }
277277
278278 if (clientApplication == null ) {
279279 // try loading X509 cert
280280 X509Certificate cert = (X509Certificate ) SQLServerCertificateUtils .loadCertificate (certFile );
281281
282- if (logger .isLoggable (Level .FINEST )) {
283- logger .finest (LOGCONTEXT + "certificate type: " + cert .getType ());
282+ if (logger .isLoggable (Level .FINER )) {
283+ logger .finer (LOGCONTEXT + "certificate type: " + cert .getType ());
284284
285285 // we don't really need to do this, MSAL will fail if cert is not valid, but good to check here and throw with proper error message
286286 cert .checkValidity ();
287- logger .finest (LOGCONTEXT + "certificate: " + cert .toString ());
287+ logger .finer (LOGCONTEXT + "certificate: " + cert .toString ());
288288 }
289289
290290 PrivateKey privateKey = SQLServerCertificateUtils .loadPrivateKey (certKey , certKeyPassword );
@@ -299,8 +299,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenPrincipalCertificate(SqlFedAuthI
299299 .acquireToken (ClientCredentialParameters .builder (scopes ).build ());
300300 final IAuthenticationResult authenticationResult = future .get ();
301301
302- if (logger .isLoggable (Level .FINEST )) {
303- logger .finest (
302+ if (logger .isLoggable (Level .FINER )) {
303+ logger .finer (
304304 LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
305305 + ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
306306 }
@@ -335,8 +335,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenIntegrated(SqlFedAuthInfo fedAut
335335 KerberosPrincipal kerberosPrincipal = new KerberosPrincipal ("username" );
336336 String user = kerberosPrincipal .getName ();
337337
338- if (logger .isLoggable (Level .FINEST )) {
339- logger .finest (LOGCONTEXT + authenticationString + ": get FedAuth token integrated, user: " + user
338+ if (logger .isLoggable (Level .FINER )) {
339+ logger .finer (LOGCONTEXT + authenticationString + ": get FedAuth token integrated, user: " + user
340340 + "realm name:" + kerberosPrincipal .getRealm ());
341341 }
342342
@@ -354,8 +354,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenIntegrated(SqlFedAuthInfo fedAut
354354
355355 final IAuthenticationResult authenticationResult = future .get ();
356356
357- if (logger .isLoggable (Level .FINEST )) {
358- logger .finest (
357+ if (logger .isLoggable (Level .FINER )) {
358+ logger .finer (
359359 LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
360360 + ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
361361 }
@@ -378,8 +378,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenInteractive(SqlFedAuthInfo fedAu
378378 String authenticationString ) throws SQLServerException {
379379 ExecutorService executorService = Executors .newSingleThreadExecutor ();
380380
381- if (logger .isLoggable (Level .FINEST )) {
382- logger .finest (LOGCONTEXT + authenticationString + ": get FedAuth token interactive for user: " + user );
381+ if (logger .isLoggable (Level .FINER )) {
382+ logger .finer (LOGCONTEXT + authenticationString + ": get FedAuth token interactive for user: " + user );
383383 }
384384
385385 lock .lock ();
@@ -406,8 +406,10 @@ static SqlAuthenticationToken getSqlFedAuthTokenInteractive(SqlFedAuthInfo fedAu
406406 acc .append (account .username ());
407407 }
408408 }
409- logger .finest (LOGCONTEXT + "Accounts in cache = " + acc + ", size = "
410- + (accountsInCache == null ? null : accountsInCache .size ()) + ", user = " + user );
409+ if (logger .isLoggable (Level .FINEST )) {
410+ logger .finest (LOGCONTEXT + "Accounts in cache = " + acc + ", size = "
411+ + (accountsInCache == null ? null : accountsInCache .size ()) + ", user = " + user );
412+ }
411413 }
412414 if (null != accountsInCache && !accountsInCache .isEmpty () && null != user && !user .isEmpty ()) {
413415 IAccount account = getAccountByUsername (accountsInCache , user );
@@ -445,8 +447,8 @@ static SqlAuthenticationToken getSqlFedAuthTokenInteractive(SqlFedAuthInfo fedAu
445447 authenticationResult = future .get ();
446448 }
447449
448- if (logger .isLoggable (Level .FINEST )) {
449- logger .finest (
450+ if (logger .isLoggable (Level .FINER )) {
451+ logger .finer (
450452 LOGCONTEXT + (authenticationResult .account () != null ? authenticationResult .account ().username ()
451453 + ": " : "" + ACCESS_TOKEN_EXPIRE + authenticationResult .expiresOnDate ()));
452454 }
@@ -526,8 +528,8 @@ PersistentTokenCacheAccessAspect getEntry(String value, String key) {
526528
527529 tokenCacheMap .put (key , persistentTokenCacheAccessAspect );
528530
529- if (logger .isLoggable (Level .FINEST )) {
530- logger .finest (LOGCONTEXT + ": entry expired for: " + value + " new entry will expire in: "
531+ if (logger .isLoggable (Level .FINER )) {
532+ logger .finer (LOGCONTEXT + ": entry expired for: " + value + " new entry will expire in: "
531533 + TimeUnit .MILLISECONDS .toSeconds (PersistentTokenCacheAccessAspect .TIME_TO_LIVE ) + "s" );
532534 }
533535 }
@@ -539,8 +541,8 @@ PersistentTokenCacheAccessAspect getEntry(String value, String key) {
539541 void addEntry (String key , PersistentTokenCacheAccessAspect value ) {
540542 value .setExpiryTime (System .currentTimeMillis () + PersistentTokenCacheAccessAspect .TIME_TO_LIVE );
541543 tokenCacheMap .put (key , value );
542- if (logger .isLoggable (Level .FINEST )) {
543- logger .finest (LOGCONTEXT + ": add entry for: " + value + ", will expire in: "
544+ if (logger .isLoggable (Level .FINER )) {
545+ logger .finer (LOGCONTEXT + ": add entry for: " + value + ", will expire in: "
544546 + TimeUnit .MILLISECONDS .toSeconds (PersistentTokenCacheAccessAspect .TIME_TO_LIVE ) + "s" );
545547 }
546548 }
0 commit comments