This is an automated email from the ASF dual-hosted git repository.

gzurowski pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/master by this push:
     new 9dc405f  [Minor] Remove unnecessary object array creation for log 
statements
9dc405f is described below

commit 9dc405fccf74479d51aa2bf8932bf5a3348796cd
Author: Gregor Zurowski <[email protected]>
AuthorDate: Tue Apr 9 08:27:27 2019 +0200

    [Minor] Remove unnecessary object array creation for log statements
---
 .../support/jsse/BaseSSLContextParameters.java     | 84 +++++++++++-----------
 1 file changed, 42 insertions(+), 42 deletions(-)

diff --git 
a/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
 
b/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
index 0fb9b2d..da3af59 100644
--- 
a/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
+++ 
b/core/camel-api/src/main/java/org/apache/camel/support/jsse/BaseSSLContextParameters.java
@@ -348,13 +348,13 @@ public abstract class BaseSSLContextParameters extends 
JsseParameters {
 
                 if (LOG.isDebugEnabled()) {
                     LOG.debug(SSL_ENGINE_CIPHER_SUITE_LOG_MSG,
-                            new Object[] {engine,
-                                          enabledCipherSuites,
-                                          enabledCipherSuitePatterns, 
-                                          
engine.getSSLParameters().getCipherSuites(),
-                                          engine.getEnabledCipherSuites(),
-                                          defaultEnabledCipherSuitePatterns,
-                                          filteredCipherSuites});
+                            engine,
+                            enabledCipherSuites,
+                            enabledCipherSuitePatterns,
+                            engine.getSSLParameters().getCipherSuites(),
+                            engine.getEnabledCipherSuites(),
+                            defaultEnabledCipherSuitePatterns,
+                            filteredCipherSuites);
                 }
                 
                 engine.setEnabledCipherSuites(filteredCipherSuites.toArray(new 
String[filteredCipherSuites.size()]));
@@ -367,13 +367,13 @@ public abstract class BaseSSLContextParameters extends 
JsseParameters {
                 
                 if (LOG.isDebugEnabled()) {
                     LOG.debug(SSL_ENGINE_PROTOCOL_LOG_MSG,
-                            new Object[] {engine,
-                                          enabledSecureSocketProtocols,
-                                          
enabledSecureSocketProtocolsPatterns, 
-                                          
engine.getSSLParameters().getProtocols(),
-                                          engine.getEnabledProtocols(),
-                                          
defaultEnabledSecureSocketProtocolsPatterns,
-                                          filteredSecureSocketProtocols});
+                            engine,
+                            enabledSecureSocketProtocols,
+                            enabledSecureSocketProtocolsPatterns,
+                            engine.getSSLParameters().getProtocols(),
+                            engine.getEnabledProtocols(),
+                            defaultEnabledSecureSocketProtocolsPatterns,
+                            filteredSecureSocketProtocols);
                 }
                 
                 
engine.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new 
String[filteredSecureSocketProtocols.size()]));
@@ -531,13 +531,13 @@ public abstract class BaseSSLContextParameters extends 
JsseParameters {
                             !allowPassthrough);
                 if (LOG.isDebugEnabled()) {
                     LOG.debug(SSL_SOCKET_CIPHER_SUITE_LOG_MSG,
-                            new Object[] {socket,
-                                          enabledCipherSuites,
-                                          enabledCipherSuitePatterns, 
-                                          
socket.getSSLParameters().getCipherSuites(),
-                                          socket.getEnabledCipherSuites(),
-                                          defaultEnabledCipherSuitePatterns,
-                                          filteredCipherSuites});
+                            socket,
+                            enabledCipherSuites,
+                            enabledCipherSuitePatterns,
+                            socket.getSSLParameters().getCipherSuites(),
+                            socket.getEnabledCipherSuites(),
+                            defaultEnabledCipherSuitePatterns,
+                            filteredCipherSuites);
                 }
                  
                 socket.setEnabledCipherSuites(filteredCipherSuites.toArray(new 
String[filteredCipherSuites.size()]));
@@ -550,13 +550,13 @@ public abstract class BaseSSLContextParameters extends 
JsseParameters {
 
                 if (LOG.isDebugEnabled()) {
                     LOG.debug(SSL_SOCKET_PROTOCOL_LOG_MSG,
-                            new Object[] {socket,
-                                          enabledSecureSocketProtocols,
-                                          
enabledSecureSocketProtocolsPatterns, 
-                                          
socket.getSSLParameters().getProtocols(),
-                                          socket.getEnabledProtocols(),
-                                          
defaultEnabledSecureSocketProtocolsPatterns,
-                                          filteredSecureSocketProtocols});
+                            socket,
+                            enabledSecureSocketProtocols,
+                            enabledSecureSocketProtocolsPatterns,
+                            socket.getSSLParameters().getProtocols(),
+                            socket.getEnabledProtocols(),
+                            defaultEnabledSecureSocketProtocolsPatterns,
+                            filteredSecureSocketProtocols);
                 }
                 
                 
socket.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new 
String[filteredSecureSocketProtocols.size()]));
@@ -631,13 +631,13 @@ public abstract class BaseSSLContextParameters extends 
JsseParameters {
                  
                 if (LOG.isDebugEnabled()) {
                     LOG.debug(SSL_SERVER_SOCKET_CIPHER_SUITE_LOG_MSG,
-                            new Object[] {socket,
-                                          enabledCipherSuites,
-                                          enabledCipherSuitePatterns, 
-                                          socket.getSupportedCipherSuites(),
-                                          socket.getEnabledCipherSuites(),
-                                          defaultEnabledCipherSuitePatterns,
-                                          filteredCipherSuites});
+                            socket,
+                            enabledCipherSuites,
+                            enabledCipherSuitePatterns,
+                            socket.getSupportedCipherSuites(),
+                            socket.getEnabledCipherSuites(),
+                            defaultEnabledCipherSuitePatterns,
+                            filteredCipherSuites);
                 }
                 
                 socket.setEnabledCipherSuites(filteredCipherSuites.toArray(new 
String[filteredCipherSuites.size()]));
@@ -650,13 +650,13 @@ public abstract class BaseSSLContextParameters extends 
JsseParameters {
 
                 if (LOG.isDebugEnabled()) {
                     LOG.debug(SSL_SERVER_SOCKET_PROTOCOL_LOG_MSG,
-                            new Object[] {socket,
-                                          enabledSecureSocketProtocols,
-                                          
enabledSecureSocketProtocolsPatterns, 
-                                          socket.getSupportedProtocols(),
-                                          socket.getEnabledProtocols(),
-                                          
defaultEnabledSecureSocketProtocolsPatterns,
-                                          filteredSecureSocketProtocols});
+                            socket,
+                            enabledSecureSocketProtocols,
+                            enabledSecureSocketProtocolsPatterns,
+                            socket.getSupportedProtocols(),
+                            socket.getEnabledProtocols(),
+                            defaultEnabledSecureSocketProtocolsPatterns,
+                            filteredSecureSocketProtocols);
                 }
                 
                 
socket.setEnabledProtocols(filteredSecureSocketProtocols.toArray(new 
String[filteredSecureSocketProtocols.size()]));

Reply via email to