This is an automated email from the ASF dual-hosted git repository.
gzurowski pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/camel.git
The following commit(s) were added to refs/heads/master by this push:
new 9dc405f [Minor] Remove unnecessary object array creation for log
statements
9dc405f is described below
commit 9dc405fccf74479d51aa2bf8932bf5a3348796cd
Author: Gregor Zurowski <[email protected]>
AuthorDate: Tue Apr 9 08:27:27 2019 +0200
[Minor] Remove unnecessary object array creation for log statements
---
.../support/jsse/BaseSSLContextParameters.java | 84 +++++++++++-----------
1 file changed, 42 insertions(+), 42 deletions(-)
diff --git
a/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
b/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
index 0fb9b2d..da3af59 100644
---
a/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
+++
b/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
@@ -348,13 +348,13 @@ public abstract class BaseSSLContextParameters extends
JsseParameters {
if (LOG.isDebugEnabled()) {
LOG.debug(SSL_ENGINE_CIPHER_SUITE_LOG_MSG,
- new Object[] {engine,
- enabledCipherSuites,
- enabledCipherSuitePatterns,
-
engine.getSSLParameters().getCipherSuites(),
- engine.getEnabledCipherSuites(),
- defaultEnabledCipherSuitePatterns,
- filteredCipherSuites});
+ engine,
+ enabledCipherSuites,
+ enabledCipherSuitePatterns,
+ engine.getSSLParameters().getCipherSuites(),
+ engine.getEnabledCipherSuites(),
+ defaultEnabledCipherSuitePatterns,
+ filteredCipherSuites);
}
engine.setEnabledCipherSuites(filteredCipherSuites.toArray(new
String[filteredCipherSuites.size()]));
@@ -367,13 +367,13 @@ public abstract class BaseSSLContextParameters extends
JsseParameters {
if (LOG.isDebugEnabled()) {
LOG.debug(SSL_ENGINE_PROTOCOL_LOG_MSG,
- new Object[] {engine,
- enabledSecureSocketProtocols,
-
enabledSecureSocketProtocolsPatterns,
-
engine.getSSLParameters().getProtocols(),
- engine.getEnabledProtocols(),
-
defaultEnabledSecureSocketProtocolsPatterns,
- filteredSecureSocketProtocols});
+ engine,
+ enabledSecureSocketProtocols,
+ enabledSecureSocketProtocolsPatterns,
+ engine.getSSLParameters().getProtocols(),
+ engine.getEnabledProtocols(),
+ defaultEnabledSecureSocketProtocolsPatterns,
+ filteredSecureSocketProtocols);
}
engine.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new
String[filteredSecureSocketProtocols.size()]));
@@ -531,13 +531,13 @@ public abstract class BaseSSLContextParameters extends
JsseParameters {
!allowPassthrough);
if (LOG.isDebugEnabled()) {
LOG.debug(SSL_SOCKET_CIPHER_SUITE_LOG_MSG,
- new Object[] {socket,
- enabledCipherSuites,
- enabledCipherSuitePatterns,
-
socket.getSSLParameters().getCipherSuites(),
- socket.getEnabledCipherSuites(),
- defaultEnabledCipherSuitePatterns,
- filteredCipherSuites});
+ socket,
+ enabledCipherSuites,
+ enabledCipherSuitePatterns,
+ socket.getSSLParameters().getCipherSuites(),
+ socket.getEnabledCipherSuites(),
+ defaultEnabledCipherSuitePatterns,
+ filteredCipherSuites);
}
socket.setEnabledCipherSuites(filteredCipherSuites.toArray(new
String[filteredCipherSuites.size()]));
@@ -550,13 +550,13 @@ public abstract class BaseSSLContextParameters extends
JsseParameters {
if (LOG.isDebugEnabled()) {
LOG.debug(SSL_SOCKET_PROTOCOL_LOG_MSG,
- new Object[] {socket,
- enabledSecureSocketProtocols,
-
enabledSecureSocketProtocolsPatterns,
-
socket.getSSLParameters().getProtocols(),
- socket.getEnabledProtocols(),
-
defaultEnabledSecureSocketProtocolsPatterns,
- filteredSecureSocketProtocols});
+ socket,
+ enabledSecureSocketProtocols,
+ enabledSecureSocketProtocolsPatterns,
+ socket.getSSLParameters().getProtocols(),
+ socket.getEnabledProtocols(),
+ defaultEnabledSecureSocketProtocolsPatterns,
+ filteredSecureSocketProtocols);
}
socket.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new
String[filteredSecureSocketProtocols.size()]));
@@ -631,13 +631,13 @@ public abstract class BaseSSLContextParameters extends
JsseParameters {
if (LOG.isDebugEnabled()) {
LOG.debug(SSL_SERVER_SOCKET_CIPHER_SUITE_LOG_MSG,
- new Object[] {socket,
- enabledCipherSuites,
- enabledCipherSuitePatterns,
- socket.getSupportedCipherSuites(),
- socket.getEnabledCipherSuites(),
- defaultEnabledCipherSuitePatterns,
- filteredCipherSuites});
+ socket,
+ enabledCipherSuites,
+ enabledCipherSuitePatterns,
+ socket.getSupportedCipherSuites(),
+ socket.getEnabledCipherSuites(),
+ defaultEnabledCipherSuitePatterns,
+ filteredCipherSuites);
}
socket.setEnabledCipherSuites(filteredCipherSuites.toArray(new
String[filteredCipherSuites.size()]));
@@ -650,13 +650,13 @@ public abstract class BaseSSLContextParameters extends
JsseParameters {
if (LOG.isDebugEnabled()) {
LOG.debug(SSL_SERVER_SOCKET_PROTOCOL_LOG_MSG,
- new Object[] {socket,
- enabledSecureSocketProtocols,
-
enabledSecureSocketProtocolsPatterns,
- socket.getSupportedProtocols(),
- socket.getEnabledProtocols(),
-
defaultEnabledSecureSocketProtocolsPatterns,
- filteredSecureSocketProtocols});
+ socket,
+ enabledSecureSocketProtocols,
+ enabledSecureSocketProtocolsPatterns,
+ socket.getSupportedProtocols(),
+ socket.getEnabledProtocols(),
+ defaultEnabledSecureSocketProtocolsPatterns,
+ filteredSecureSocketProtocols);
}
socket.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new
String[filteredSecureSocketProtocols.size()]));