Return-Path: X-Original-To: apmail-hadoop-common-commits-archive@www.apache.org Delivered-To: apmail-hadoop-common-commits-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id A0B8BC21A for ; Tue, 5 Jun 2012 04:29:22 +0000 (UTC) Received: (qmail 14643 invoked by uid 500); 5 Jun 2012 04:29:20 -0000 Delivered-To: apmail-hadoop-common-commits-archive@hadoop.apache.org Received: (qmail 14406 invoked by uid 500); 5 Jun 2012 04:29:18 -0000 Mailing-List: contact common-commits-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: common-dev@hadoop.apache.org Delivered-To: mailing list common-commits@hadoop.apache.org Received: (qmail 14357 invoked by uid 99); 5 Jun 2012 04:29:16 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 05 Jun 2012 04:29:16 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 05 Jun 2012 04:29:15 +0000 Received: from eris.apache.org (localhost [127.0.0.1]) by eris.apache.org (Postfix) with ESMTP id 89283238897A; Tue, 5 Jun 2012 04:28:55 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r1346236 - in /hadoop/common/branches/branch-0.22/common: CHANGES.txt src/java/org/apache/hadoop/ipc/Server.java Date: Tue, 05 Jun 2012 04:28:55 -0000 To: common-commits@hadoop.apache.org From: shv@apache.org X-Mailer: svnmailer-1.0.8-patched Message-Id: <20120605042855.89283238897A@eris.apache.org> X-Virus-Checked: Checked by ClamAV on apache.org Author: shv Date: Tue Jun 5 04:28:54 2012 New Revision: 1346236 URL: http://svn.apache.org/viewvc?rev=1346236&view=rev Log: HADOOP-7272. Remove unnecessary security related info logs. Contributed by Suresh Srinivas and Benoy Antony. Modified: hadoop/common/branches/branch-0.22/common/CHANGES.txt hadoop/common/branches/branch-0.22/common/src/java/org/apache/hadoop/ipc/Server.java Modified: hadoop/common/branches/branch-0.22/common/CHANGES.txt URL: http://svn.apache.org/viewvc/hadoop/common/branches/branch-0.22/common/CHANGES.txt?rev=1346236&r1=1346235&r2=1346236&view=diff ============================================================================== --- hadoop/common/branches/branch-0.22/common/CHANGES.txt (original) +++ hadoop/common/branches/branch-0.22/common/CHANGES.txt Tue Jun 5 04:28:54 2012 @@ -37,6 +37,9 @@ Release 0.22.1 - Unreleased HADOOP-7621. Alfredo config should be in a file not readable by users. (Aaron T. Myers and Benoy Antony via shv) + HADOOP-7272. Remove unnecessary security related info logs. + (Suresh Srinivas and Benoy Antony via shv) + Release 0.22.0 - 2011-11-29 INCOMPATIBLE CHANGES Modified: hadoop/common/branches/branch-0.22/common/src/java/org/apache/hadoop/ipc/Server.java URL: http://svn.apache.org/viewvc/hadoop/common/branches/branch-0.22/common/src/java/org/apache/hadoop/ipc/Server.java?rev=1346236&r1=1346235&r2=1346236&view=diff ============================================================================== --- hadoop/common/branches/branch-0.22/common/src/java/org/apache/hadoop/ipc/Server.java (original) +++ hadoop/common/branches/branch-0.22/common/src/java/org/apache/hadoop/ipc/Server.java Tue Jun 5 04:28:54 2012 @@ -1079,12 +1079,16 @@ public abstract class Server { null); } if (saslServer.isComplete()) { - LOG.info("SASL server context established. Negotiated QoP is " - + saslServer.getNegotiatedProperty(Sasl.QOP)); + if (LOG.isDebugEnabled()) { + LOG.debug("SASL server context established. Negotiated QoP is " + + saslServer.getNegotiatedProperty(Sasl.QOP)); + } String qop = (String) saslServer.getNegotiatedProperty(Sasl.QOP); useWrap = qop != null && !"auth".equalsIgnoreCase(qop); user = getAuthorizedUgi(saslServer.getAuthorizationID()); - LOG.info("SASL server successfully authenticated client: " + user); + if (LOG.isDebugEnabled()) { + LOG.debug("SASL server successfully authenticated client: " + user); + } rpcMetrics.authenticationSuccesses.inc(); AUDITLOG.info(AUTH_SUCCESSFULL_FOR + user); saslContextEstablished = true;