diff --git a/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultAccessControlAsyncClient.java b/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultAccessControlAsyncClient.java index feb4ad90cb7b..1a9f148940c1 100644 --- a/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultAccessControlAsyncClient.java +++ b/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultAccessControlAsyncClient.java @@ -152,8 +152,8 @@ Mono> listRoleDefinitionsFirstPage(String return clientImpl.getRoleDefinitions() .listSinglePageAsync(vaultUrl, roleScope.toString(), null, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing role definitions for roleScope - {}", roleScope)) - .doOnSuccess(response -> logger.info("Listed role definitions for roleScope - {}", roleScope)) + .doOnRequest(ignored -> logger.verbose("Listing role definitions for roleScope - {}", roleScope)) + .doOnSuccess(response -> logger.verbose("Listed role definitions for roleScope - {}", roleScope)) .doOnError(error -> logger.warning(String.format("Failed to list role definitions for roleScope - %s", roleScope), error)) .map(KeyVaultAccessControlAsyncClient::transformRoleDefinitionsPagedResponse); @@ -178,8 +178,8 @@ Mono> listRoleDefinitionsNextPage(String c return clientImpl.getRoleDefinitions() .listNextSinglePageAsync(continuationToken, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next role definitions page - Page {}", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next role definitions page - Page {}", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next role definitions page - Page {}", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next role definitions page - Page {}", continuationToken)) .doOnError(error -> logger.warning("Failed to list next role definitions page - Page {}", continuationToken, error)) .map(KeyVaultAccessControlAsyncClient::transformRoleDefinitionsPagedResponse); @@ -240,8 +240,8 @@ Mono> listRoleAssignmentsFirstPage(String return clientImpl.getRoleAssignments() .listForScopeSinglePageAsync(vaultUrl, roleScope.toString(), null, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing role assignments for roleScope - {}", roleScope)) - .doOnSuccess(response -> logger.info("Listed role assignments for roleScope - {}", roleScope)) + .doOnRequest(ignored -> logger.verbose("Listing role assignments for roleScope - {}", roleScope)) + .doOnSuccess(response -> logger.verbose("Listed role assignments for roleScope - {}", roleScope)) .doOnError(error -> logger.warning(String.format("Failed to list role assignments for roleScope - %s", roleScope), error)) .map(KeyVaultAccessControlAsyncClient::transformRoleAssignmentsPagedResponse); @@ -265,8 +265,8 @@ Mono> listRoleAssignmentsNextPage(String c return clientImpl.getRoleAssignments() .listForScopeNextSinglePageAsync(continuationToken, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next role assignments page - Page {}", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next role assignments page - Page {}", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next role assignments page - Page {}", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next role assignments page - Page {}", continuationToken)) .doOnError(error -> logger.warning("Failed to list next role assignments page - Page {}", continuationToken, error)) .map(KeyVaultAccessControlAsyncClient::transformRoleAssignmentsPagedResponse); @@ -361,8 +361,8 @@ Mono> createRoleAssignmentWithResponse(KeyVault return clientImpl.getRoleAssignments() .createWithResponseAsync(vaultUrl, roleScope.toString(), roleAssignmentName, parameters, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Creating role assignment - {}", roleAssignmentName)) - .doOnSuccess(response -> logger.info("Created role assignment - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Creating role assignment - {}", roleAssignmentName)) + .doOnSuccess(response -> logger.verbose("Created role assignment - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to create role assignment - {}", roleAssignmentName, error)) .map(KeyVaultAccessControlAsyncClient::transformRoleAssignmentResponse); } catch (RuntimeException e) { @@ -422,8 +422,8 @@ Mono> getRoleAssignmentWithResponse(KeyVaultRol return clientImpl.getRoleAssignments() .getWithResponseAsync(vaultUrl, roleScope.toString(), roleAssignmentName, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving role assignment - {}", roleAssignmentName)) - .doOnSuccess(response -> logger.info("Retrieved role assignment - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving role assignment - {}", roleAssignmentName)) + .doOnSuccess(response -> logger.verbose("Retrieved role assignment - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to retrieved role assignment - {}", roleAssignmentName, error)) .map(KeyVaultAccessControlAsyncClient::transformRoleAssignmentResponse); } catch (RuntimeException e) { @@ -483,8 +483,8 @@ Mono> deleteRoleAssignmentWithResponse(KeyVault return clientImpl.getRoleAssignments() .deleteWithResponseAsync(vaultUrl, roleScope.toString(), roleAssignmentName, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Deleting role assignment - {}", roleAssignmentName)) - .doOnSuccess(response -> logger.info("Deleted role assignment - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Deleting role assignment - {}", roleAssignmentName)) + .doOnSuccess(response -> logger.verbose("Deleted role assignment - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to delete role assignment - {}", roleAssignmentName, error)) .map(KeyVaultAccessControlAsyncClient::transformRoleAssignmentResponse); } catch (RuntimeException e) { diff --git a/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultBackupAsyncClient.java b/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultBackupAsyncClient.java index fa0fb2ccccb5..5294dd4c45a5 100644 --- a/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultBackupAsyncClient.java +++ b/sdk/keyvault/azure-security-keyvault-administration/src/main/java/com/azure/security/keyvault/administration/KeyVaultBackupAsyncClient.java @@ -159,8 +159,8 @@ Mono> backupWithResponse(String blobStorageUrl try { return clientImpl.fullBackupWithResponseAsync(vaultUrl, sasTokenParameter, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Backing up at URL - {}", blobStorageUrl)) - .doOnSuccess(response -> logger.info("Backed up at URL - {}", + .doOnRequest(ignored -> logger.verbose("Backing up at URL - {}", blobStorageUrl)) + .doOnSuccess(response -> logger.verbose("Backed up at URL - {}", response.getValue().getAzureStorageBlobContainerUri())) .doOnError(error -> logger.warning("Failed to backup at URL - {}", blobStorageUrl, error)) .map(backupOperationResponse -> @@ -327,8 +327,8 @@ Mono> restoreWithResponse(String backupFolder try { return clientImpl.fullRestoreOperationWithResponseAsync(vaultUrl, restoreOperationParameters, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Restoring from location - {}", backupFolderUrl)) - .doOnSuccess(response -> logger.info("Restored from location - {}", backupFolderUrl)) + .doOnRequest(ignored -> logger.verbose("Restoring from location - {}", backupFolderUrl)) + .doOnSuccess(response -> logger.verbose("Restored from location - {}", backupFolderUrl)) .doOnError(error -> logger.warning("Failed to restore from location - {}", backupFolderUrl, error)) .map(restoreOperationResponse -> @@ -481,9 +481,9 @@ Mono> selectiveRestoreWithResponse(String key selectiveKeyRestoreOperationParameters, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) .doOnRequest(ignored -> - logger.info("Restoring key \"{}\" from location - {}", keyName, backupFolderUrl)) + logger.verbose("Restoring key \"{}\" from location - {}", keyName, backupFolderUrl)) .doOnSuccess(response -> - logger.info("Restored key \"{}\" from location - {}", keyName, backupFolderUrl)) + logger.verbose("Restored key \"{}\" from location - {}", keyName, backupFolderUrl)) .doOnError(error -> logger.warning("Failed to restore key \"{}\" from location - {}", keyName, backupFolderUrl, error)) .map(restoreOperationResponse -> diff --git a/sdk/keyvault/azure-security-keyvault-certificates/src/main/java/com/azure/security/keyvault/certificates/CertificateAsyncClient.java b/sdk/keyvault/azure-security-keyvault-certificates/src/main/java/com/azure/security/keyvault/certificates/CertificateAsyncClient.java index feeb06e291f9..3766b4e66070 100644 --- a/sdk/keyvault/azure-security-keyvault-certificates/src/main/java/com/azure/security/keyvault/certificates/CertificateAsyncClient.java +++ b/sdk/keyvault/azure-security-keyvault-certificates/src/main/java/com/azure/security/keyvault/certificates/CertificateAsyncClient.java @@ -349,8 +349,8 @@ Mono> getCertificateWithResponse(String return service.getCertificateWithPolicy(vaultUrl, certificateName, version, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving certificate - {}", certificateName)) - .doOnSuccess(response -> logger.info("Retrieved the certificate - {}", response.getValue().getProperties().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving certificate - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Retrieved the certificate - {}", response.getValue().getProperties().getName())) .doOnError(error -> logger.warning("Failed to Retrieve the certificate - {}", certificateName, error)); } @@ -358,8 +358,8 @@ Mono> getCertificateVersionWithResponse(String cer context = context == null ? Context.NONE : context; return service.getCertificate(vaultUrl, certificateName, version, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context) - .doOnRequest(ignored -> logger.info("Retrieving certificate - {}", certificateName)) - .doOnSuccess(response -> logger.info("Retrieved the certificate - {}", response.getValue().getProperties().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving certificate - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Retrieved the certificate - {}", response.getValue().getProperties().getName())) .doOnError(error -> logger.warning("Failed to Retrieve the certificate - {}", certificateName, error)); } @@ -473,8 +473,8 @@ Mono> updateCertificatePropertiesWithResponse(Cert .certificateAttributes(new CertificateRequestAttributes(properties)); return service.updateCertificate(vaultUrl, properties.getName(), properties.getVersion(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Updating certificate - {}", properties.getName())) - .doOnSuccess(response -> logger.info("Updated the certificate - {}", properties.getName())) + .doOnRequest(ignored -> logger.verbose("Updating certificate - {}", properties.getName())) + .doOnSuccess(response -> logger.verbose("Updated the certificate - {}", properties.getName())) .doOnError(error -> logger.warning("Failed to update the certificate - {}", properties.getName(), error)); } @@ -557,8 +557,8 @@ private Function, Mono> deleteCertificateWithResponse(String certificateName, Context context) { return service.deleteCertificate(vaultUrl, certificateName, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Deleting certificate - {}", certificateName)) - .doOnSuccess(response -> logger.info("Deleted the certificate - {}", response.getValue().getProperties().getName())) + .doOnRequest(ignored -> logger.verbose("Deleting certificate - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Deleted the certificate - {}", response.getValue().getProperties().getName())) .doOnError(error -> logger.warning("Failed to delete the certificate - {}", certificateName, error)); } @@ -618,8 +618,8 @@ Mono> getDeletedCertificateWithResponse(String cert return service.getDeletedCertificate(vaultUrl, certificateName, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving deleted certificate - {}", certificateName)) - .doOnSuccess(response -> logger.info("Retrieved the deleted certificate - {}", response.getValue().getProperties().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving deleted certificate - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Retrieved the deleted certificate - {}", response.getValue().getProperties().getName())) .doOnError(error -> logger.warning("Failed to Retrieve the deleted certificate - {}", certificateName, error)); } @@ -676,8 +676,8 @@ Mono> purgeDeletedCertificateWithResponse(String certificateName, return service.purgeDeletedcertificate(vaultUrl, certificateName, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Purging certificate - {}", certificateName)) - .doOnSuccess(response -> logger.info("Purged the certificate - {}", response.getStatusCode())) + .doOnRequest(ignored -> logger.verbose("Purging certificate - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Purged the certificate - {}", response.getStatusCode())) .doOnError(error -> logger.warning("Failed to purge the certificate - {}", certificateName, error)); } @@ -762,8 +762,8 @@ private Function, Mono> recoverDeletedCertificateWithResponse(String certificateName, Context context) { return service.recoverDeletedCertificate(vaultUrl, certificateName, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Recovering deleted certificate - {}", certificateName)) - .doOnSuccess(response -> logger.info("Recovered the deleted certificate - {}", response.getValue().getProperties().getName())) + .doOnRequest(ignored -> logger.verbose("Recovering deleted certificate - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Recovered the deleted certificate - {}", response.getValue().getProperties().getName())) .doOnError(error -> logger.warning("Failed to recover the deleted certificate - {}", certificateName, error)); } @@ -820,8 +820,8 @@ Mono> backupCertificateWithResponse(String certificateName, Con return service.backupCertificate(vaultUrl, certificateName, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Backing up certificate - {}", certificateName)) - .doOnSuccess(response -> logger.info("Backed up the certificate - {}", response.getStatusCode())) + .doOnRequest(ignored -> logger.verbose("Backing up certificate - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Backed up the certificate - {}", response.getStatusCode())) .doOnError(error -> logger.warning("Failed to back up the certificate - {}", certificateName, error)) .flatMap(certificateBackupResponse -> Mono.just(new SimpleResponse<>(certificateBackupResponse.getRequest(), certificateBackupResponse.getStatusCode(), certificateBackupResponse.getHeaders(), certificateBackupResponse.getValue().getValue()))); @@ -879,8 +879,8 @@ Mono> restoreCertificateBackupWithRespon CertificateRestoreParameters parameters = new CertificateRestoreParameters().certificateBundleBackup(backup); return service.restoreCertificate(vaultUrl, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Restoring the certificate")) - .doOnSuccess(response -> logger.info("Restored the certificate - {}", response.getValue().getProperties().getName())) + .doOnRequest(ignored -> logger.verbose("Restoring the certificate")) + .doOnSuccess(response -> logger.verbose("Restored the certificate - {}", response.getValue().getProperties().getName())) .doOnError(error -> logger.warning("Failed to restore the certificate - {}", error)); } @@ -952,8 +952,8 @@ private Mono> listCertificatesNextPage(Stri try { return service.getCertificates(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next certificates page - Page {} ", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next certificates page - Page {} ", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next certificates page - Page {} ", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next certificates page - Page {} ", continuationToken)) .doOnError(error -> logger.warning("Failed to list next certificates page - Page {} ", continuationToken, error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -968,8 +968,8 @@ private Mono> listCertificatesFirstPage(boo return service .getCertificates(vaultUrl, DEFAULT_MAX_PAGE_RESULTS, includePending, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing certificates")) - .doOnSuccess(response -> logger.info("Listed certificates")) + .doOnRequest(ignored -> logger.verbose("Listing certificates")) + .doOnSuccess(response -> logger.verbose("Listed certificates")) .doOnError(error -> logger.warning("Failed to list certificates", error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1048,9 +1048,9 @@ private Mono> listDeletedCertificatesNextPage( .getDeletedCertificates(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) .doOnRequest( - ignored -> logger.info("Listing next deleted certificates page - Page {} ", continuationToken)) + ignored -> logger.verbose("Listing next deleted certificates page - Page {} ", continuationToken)) .doOnSuccess( - response -> logger.info("Listed next deleted certificates page - Page {} ", continuationToken)) + response -> logger.verbose("Listed next deleted certificates page - Page {} ", continuationToken)) .doOnError(error -> logger .warning("Failed to list next deleted certificates page - Page {} ", continuationToken, error)); } catch (RuntimeException ex) { @@ -1065,8 +1065,8 @@ private Mono> listDeletedCertificatesFirstPage try { return service.getDeletedCertificates(vaultUrl, DEFAULT_MAX_PAGE_RESULTS, includePending, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing deleted certificates")) - .doOnSuccess(response -> logger.info("Listed deleted certificates")) + .doOnRequest(ignored -> logger.verbose("Listing deleted certificates")) + .doOnSuccess(response -> logger.verbose("Listed deleted certificates")) .doOnError(error -> logger.warning("Failed to list deleted certificates", error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1111,8 +1111,8 @@ private Mono> listCertificateVersionsFirstP try { return service.getCertificateVersions(vaultUrl, certificateName, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing certificate versions - {}", certificateName)) - .doOnSuccess(response -> logger.info("Listed certificate versions - {}", certificateName)) + .doOnRequest(ignored -> logger.verbose("Listing certificate versions - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Listed certificate versions - {}", certificateName)) .doOnError(error -> logger.warning(String.format("Failed to list certificate versions - {}", certificateName), error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1126,8 +1126,8 @@ private Mono> listCertificateVersionsNextPa try { return service.getCertificates(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next certificate versions page - Page {} ", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next certificate versions page - Page {} ", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next certificate versions page - Page {} ", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next certificate versions page - Page {} ", continuationToken)) .doOnError(error -> logger.warning("Failed to list next certificate versions page - Page {} ", continuationToken, error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1190,8 +1190,8 @@ Mono> mergeCertificateWithResponse(Merge .certificateAttributes(new CertificateRequestAttributes().enabled(mergeCertificateOptions.isEnabled())); return service.mergeCertificate(vaultUrl, mergeCertificateOptions.getName(), apiVersion, ACCEPT_LANGUAGE, mergeParameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Merging certificate - {}", mergeCertificateOptions.getName())) - .doOnSuccess(response -> logger.info("Merged certificate - {}", response.getValue().getProperties().getName())) + .doOnRequest(ignored -> logger.verbose("Merging certificate - {}", mergeCertificateOptions.getName())) + .doOnSuccess(response -> logger.verbose("Merged certificate - {}", response.getValue().getProperties().getName())) .doOnError(error -> logger.warning("Failed to merge certificate - {}", mergeCertificateOptions.getName(), error)); } @@ -1245,8 +1245,8 @@ Mono> getCertificatePolicyWithResponse(String certif context = context == null ? Context.NONE : context; return service.getCertificatePolicy(vaultUrl, apiVersion, ACCEPT_LANGUAGE, certificateName, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving certificate policy - {}", certificateName)) - .doOnSuccess(response -> logger.info("Retrieved certificate policy - {}", certificateName)) + .doOnRequest(ignored -> logger.verbose("Retrieving certificate policy - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Retrieved certificate policy - {}", certificateName)) .doOnError(error -> logger.warning("Failed to retrieve certificate policy - {}", certificateName, error)); } @@ -1307,8 +1307,8 @@ Mono> updateCertificatePolicyWithResponse(String cer CertificatePolicyRequest policyRequest = new CertificatePolicyRequest(policy); return service.updateCertificatePolicy(vaultUrl, apiVersion, ACCEPT_LANGUAGE, certificateName, policyRequest, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Updating certificate policy - {}", certificateName)) - .doOnSuccess(response -> logger.info("Updated the certificate policy - {}", response.getValue().getUpdatedOn())) + .doOnRequest(ignored -> logger.verbose("Updating certificate policy - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Updated the certificate policy - {}", response.getValue().getUpdatedOn())) .doOnError(error -> logger.warning("Failed to update the certificate policy - {}", certificateName, error)); } @@ -1371,8 +1371,8 @@ Mono> createIssuerWithResponse(CertificateIssuer iss .credentials(new IssuerCredentials().password(issuer.getPassword()).accountId(issuer.getAccountId())); return service.setCertificateIssuer(vaultUrl, apiVersion, ACCEPT_LANGUAGE, issuer.getName(), parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Creating certificate issuer - {}", issuer.getName())) - .doOnSuccess(response -> logger.info("Created the certificate issuer - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Creating certificate issuer - {}", issuer.getName())) + .doOnSuccess(response -> logger.verbose("Created the certificate issuer - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to create the certificate issuer - {}", issuer.getName(), error)); } @@ -1427,8 +1427,8 @@ Mono> getIssuerWithResponse(String issuerName, Conte context = context == null ? Context.NONE : context; return service.getCertificateIssuer(vaultUrl, apiVersion, ACCEPT_LANGUAGE, issuerName, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving certificate issuer - {}", issuerName)) - .doOnSuccess(response -> logger.info("Retrieved the certificate issuer - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving certificate issuer - {}", issuerName)) + .doOnSuccess(response -> logger.verbose("Retrieved the certificate issuer - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to retreive the certificate issuer - {}", issuerName, error)); } @@ -1485,8 +1485,8 @@ Mono> deleteIssuerWithResponse(String issuerName, Co context = context == null ? Context.NONE : context; return service.deleteCertificateIssuer(vaultUrl, issuerName, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Deleting certificate issuer - {}", issuerName)) - .doOnSuccess(response -> logger.info("Deleted the certificate issuer - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Deleting certificate issuer - {}", issuerName)) + .doOnSuccess(response -> logger.verbose("Deleted the certificate issuer - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to delete the certificate issuer - {}", issuerName, error)); } @@ -1525,8 +1525,8 @@ private Mono> listPropertiesOfIssuersFirstPage(C try { return service.getCertificateIssuers(vaultUrl, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing certificate issuers - {}")) - .doOnSuccess(response -> logger.info("Listed certificate issuers - {}")) + .doOnRequest(ignored -> logger.verbose("Listing certificate issuers - {}")) + .doOnSuccess(response -> logger.verbose("Listed certificate issuers - {}")) .doOnError(error -> logger.warning(String.format("Failed to list certificate issuers - {}"), error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1544,8 +1544,8 @@ private Mono> listPropertiesOfIssuersNextPage(St try { return service.getCertificateIssuers(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next certificate issuers page - Page {} ", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next certificate issuers page - Page {} ", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next certificate issuers page - Page {} ", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next certificate issuers page - Page {} ", continuationToken)) .doOnError(error -> logger.warning("Failed to list next certificate issuers page - Page {} ", continuationToken, error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1611,8 +1611,8 @@ Mono> updateIssuerWithResponse(CertificateIssuer iss .credentials(new IssuerCredentials().password(issuer.getPassword()).accountId(issuer.getAccountId())); return service.updateCertificateIssuer(vaultUrl, issuer.getName(), apiVersion, ACCEPT_LANGUAGE, updateParameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Updating certificate issuer - {}", issuer.getName())) - .doOnSuccess(response -> logger.info("Updated up the certificate issuer - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Updating certificate issuer - {}", issuer.getName())) + .doOnSuccess(response -> logger.verbose("Updated up the certificate issuer - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to updated the certificate issuer - {}", issuer.getName(), error)); } @@ -1650,8 +1650,8 @@ private Mono> setCertificateContactsWithRespon Contacts contactsParams = new Contacts().contactList(contacts); return service.setCertificateContacts(vaultUrl, apiVersion, ACCEPT_LANGUAGE, contactsParams, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing certificate contacts - {}")) - .doOnSuccess(response -> logger.info("Listed certificate contacts - {}")) + .doOnRequest(ignored -> logger.verbose("Listing certificate contacts - {}")) + .doOnSuccess(response -> logger.verbose("Listed certificate contacts - {}")) .doOnError(error -> logger.warning(String.format("Failed to list certificate contacts - {}"), error)); } @@ -1685,8 +1685,8 @@ private Mono> listCertificateContactsFirstPage try { return service.getCertificateContacts(vaultUrl, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing certificate contacts - {}")) - .doOnSuccess(response -> logger.info("Listed certificate contacts - {}")) + .doOnRequest(ignored -> logger.verbose("Listing certificate contacts - {}")) + .doOnSuccess(response -> logger.verbose("Listed certificate contacts - {}")) .doOnError(error -> logger.warning(String.format("Failed to list certificate contacts - {}"), error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1722,8 +1722,8 @@ PagedFlux deleteContacts(Context context) { private Mono> deleteCertificateContactsWithResponse(Context context) { return service.deleteCertificateContacts(vaultUrl, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Deleting certificate contacts - {}")) - .doOnSuccess(response -> logger.info("Deleted certificate contacts - {}")) + .doOnRequest(ignored -> logger.verbose("Deleting certificate contacts - {}")) + .doOnSuccess(response -> logger.verbose("Deleted certificate contacts - {}")) .doOnError(error -> logger.warning(String.format("Failed to delete certificate contacts - {}"), error)); } @@ -1778,8 +1778,8 @@ public Mono> deleteCertificateOperationWithRespon Mono> deleteCertificateOperationWithResponse(String certificateName, Context context) { return service.deletetCertificateOperation(vaultUrl, certificateName, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Deleting certificate operation - {}", certificateName)) - .doOnSuccess(response -> logger.info("Deleted the certificate operation - {}", response.getStatusCode())) + .doOnRequest(ignored -> logger.verbose("Deleting certificate operation - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Deleted the certificate operation - {}", response.getStatusCode())) .doOnError(error -> logger.warning("Failed to delete the certificate operation - {}", certificateName, error)); } @@ -1788,8 +1788,8 @@ Mono> cancelCertificateOperationWithResponse(Stri CertificateOperationUpdateParameter parameter = new CertificateOperationUpdateParameter().cancellationRequested(true); return service.updateCertificateOperation(vaultUrl, certificateName, apiVersion, ACCEPT_LANGUAGE, parameter, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Cancelling certificate operation - {}", certificateName)) - .doOnSuccess(response -> logger.info("Cancelled the certificate operation - {}", response.getValue().getStatus())) + .doOnRequest(ignored -> logger.verbose("Cancelling certificate operation - {}", certificateName)) + .doOnSuccess(response -> logger.verbose("Cancelled the certificate operation - {}", response.getValue().getStatus())) .doOnError(error -> logger.warning("Failed to cancel the certificate operation - {}", certificateName, error)); } diff --git a/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/KeyAsyncClient.java b/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/KeyAsyncClient.java index 413f9d806d39..0907101f3191 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/KeyAsyncClient.java +++ b/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/KeyAsyncClient.java @@ -169,8 +169,8 @@ Mono> createKeyWithResponse(String name, KeyType keyType, KeyRequestParameters parameters = new KeyRequestParameters().setKty(keyType); return service.createKey(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Creating key - {}", name)) - .doOnSuccess(response -> logger.info("Created key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Creating key - {}", name)) + .doOnSuccess(response -> logger.verbose("Created key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to create key - {}", name, error)); } @@ -217,8 +217,8 @@ Mono> createKeyWithResponse(CreateKeyOptions createKeyOpti .setReleasePolicy(createKeyOptions.getReleasePolicy()); return service.createKey(vaultUrl, createKeyOptions.getName(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Creating key - {}", createKeyOptions.getName())) - .doOnSuccess(response -> logger.info("Created key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Creating key - {}", createKeyOptions.getName())) + .doOnSuccess(response -> logger.verbose("Created key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to create key - {}", createKeyOptions.getName(), error)); } @@ -299,8 +299,8 @@ Mono> createRsaKeyWithResponse(CreateRsaKeyOptions createR .setPublicExponent(createRsaKeyOptions.getPublicExponent()); return service.createKey(vaultUrl, createRsaKeyOptions.getName(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Creating Rsa key - {}", createRsaKeyOptions.getName())) - .doOnSuccess(response -> logger.info("Created Rsa key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Creating Rsa key - {}", createRsaKeyOptions.getName())) + .doOnSuccess(response -> logger.verbose("Created Rsa key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to create Rsa key - {}", createRsaKeyOptions.getName(), error)); } @@ -386,8 +386,8 @@ Mono> createEcKeyWithResponse(CreateEcKeyOptions createEcK .setReleasePolicy(createEcKeyOptions.getReleasePolicy()); return service.createKey(vaultUrl, createEcKeyOptions.getName(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Creating Ec key - {}", createEcKeyOptions.getName())) - .doOnSuccess(response -> logger.info("Created Ec key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Creating Ec key - {}", createEcKeyOptions.getName())) + .doOnSuccess(response -> logger.verbose("Created Ec key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to create Ec key - {}", createEcKeyOptions.getName(), error)); } @@ -421,8 +421,8 @@ Mono> importKeyWithResponse(String name, JsonWebKey keyMat KeyImportRequestParameters parameters = new KeyImportRequestParameters().setKey(keyMaterial); return service.importKey(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Importing key - {}", name)) - .doOnSuccess(response -> logger.info("Imported key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Importing key - {}", name)) + .doOnSuccess(response -> logger.verbose("Imported key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to import key - {}", name, error)); } @@ -500,8 +500,8 @@ Mono> importKeyWithResponse(ImportKeyOptions importKeyOpti .setReleasePolicy(importKeyOptions.getReleasePolicy()); return service.importKey(vaultUrl, importKeyOptions.getName(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Importing key - {}", importKeyOptions.getName())) - .doOnSuccess(response -> logger.info("Imported key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Importing key - {}", importKeyOptions.getName())) + .doOnSuccess(response -> logger.verbose("Imported key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to import key - {}", importKeyOptions.getName(), error)); } @@ -593,8 +593,8 @@ Mono> exportKeyWithResponse(String name, String version, S return service.exportKey(vaultUrl, name, version, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Exporting key - {}", name)) - .doOnSuccess(response -> logger.info("Exported key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Exporting key - {}", name)) + .doOnSuccess(response -> logger.verbose("Exported key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to export key - {}", name, error)); } @@ -659,8 +659,8 @@ Mono> getKeyWithResponse(String name, String version, Cont context = context == null ? Context.NONE : context; return service.getKey(vaultUrl, name, version, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving key - {}", name)) - .doOnSuccess(response -> logger.info("Retrieved key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving key - {}", name)) + .doOnSuccess(response -> logger.verbose("Retrieved key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to get key - {}", name, error)); } @@ -764,8 +764,8 @@ Mono> updateKeyPropertiesWithResponse(KeyProperties keyPro } return service.updateKey(vaultUrl, keyProperties.getName(), keyProperties.getVersion(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Updating key - {}", keyProperties.getName())) - .doOnSuccess(response -> logger.info("Updated key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Updating key - {}", keyProperties.getName())) + .doOnSuccess(response -> logger.verbose("Updated key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to update key - {}", keyProperties.getName(), error)); } @@ -850,8 +850,8 @@ private Function, Mono>> cre Mono> deleteKeyWithResponse(String name, Context context) { return service.deleteKey(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Deleting key - {}", name)) - .doOnSuccess(response -> logger.info("Deleted key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Deleting key - {}", name)) + .doOnSuccess(response -> logger.verbose("Deleted key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to delete key - {}", name, error)); } @@ -910,8 +910,8 @@ Mono> getDeletedKeyWithResponse(String name, Context contex context = context == null ? Context.NONE : context; return service.getDeletedKey(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving deleted key - {}", name)) - .doOnSuccess(response -> logger.info("Retrieved deleted key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving deleted key - {}", name)) + .doOnSuccess(response -> logger.verbose("Retrieved deleted key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to get key - {}", name, error)); } @@ -969,8 +969,8 @@ Mono> purgeDeletedKeyWithResponse(String name, Context context) { context = context == null ? Context.NONE : context; return service.purgeDeletedKey(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Purging deleted key - {}", name)) - .doOnSuccess(response -> logger.info("Purged deleted key - {}", name)) + .doOnRequest(ignored -> logger.verbose("Purging deleted key - {}", name)) + .doOnSuccess(response -> logger.verbose("Purged deleted key - {}", name)) .doOnError(error -> logger.warning("Failed to purge deleted key - {}", name, error)); } @@ -1051,8 +1051,8 @@ private Function, Mono>> c Mono> recoverDeletedKeyWithResponse(String name, Context context) { return service.recoverDeletedKey(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Recovering deleted key - {}", name)) - .doOnSuccess(response -> logger.info("Recovered deleted key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Recovering deleted key - {}", name)) + .doOnSuccess(response -> logger.verbose("Recovered deleted key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to recover deleted key - {}", name, error)); } @@ -1125,8 +1125,8 @@ Mono> backupKeyWithResponse(String name, Context context) { context = context == null ? Context.NONE : context; return service.backupKey(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Backing up key - {}", name)) - .doOnSuccess(response -> logger.info("Backed up key - {}", name)) + .doOnRequest(ignored -> logger.verbose("Backing up key - {}", name)) + .doOnSuccess(response -> logger.verbose("Backed up key - {}", name)) .doOnError(error -> logger.warning("Failed to backup key - {}", name, error)) .flatMap(base64URLResponse -> Mono.just(new SimpleResponse(base64URLResponse.getRequest(), base64URLResponse.getStatusCode(), base64URLResponse.getHeaders(), base64URLResponse.getValue().getValue()))); @@ -1200,8 +1200,8 @@ Mono> restoreKeyBackupWithResponse(byte[] backup, Context KeyRestoreRequestParameters parameters = new KeyRestoreRequestParameters().setKeyBackup(backup); return service.restoreKey(vaultUrl, apiVersion, parameters, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Attempting to restore key")) - .doOnSuccess(response -> logger.info("Restored Key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Attempting to restore key")) + .doOnSuccess(response -> logger.verbose("Restored Key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to restore key - {}", error)); } @@ -1249,8 +1249,8 @@ private Mono> listKeysNextPage(String continuationT try { return service.getKeys(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next keys page - Page {} ", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next keys page - Page {} ", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next keys page - Page {} ", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next keys page - Page {} ", continuationToken)) .doOnError(error -> logger.warning("Failed to list next keys page - Page {} ", continuationToken, error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1265,8 +1265,8 @@ private Mono> listKeysFirstPage(Context context) { try { return service.getKeys(vaultUrl, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing keys")) - .doOnSuccess(response -> logger.info("Listed keys")) + .doOnRequest(ignored -> logger.verbose("Listing keys")) + .doOnSuccess(response -> logger.verbose("Listed keys")) .doOnError(error -> logger.warning("Failed to list keys", error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1315,8 +1315,8 @@ private Mono> listDeletedKeysNextPage(String continuat try { return service.getDeletedKeys(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next deleted keys page - Page {} ", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next deleted keys page - Page {} ", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next deleted keys page - Page {} ", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next deleted keys page - Page {} ", continuationToken)) .doOnError(error -> logger.warning("Failed to list next deleted keys page - Page {} ", continuationToken, error)); } catch (RuntimeException ex) { @@ -1332,8 +1332,8 @@ private Mono> listDeletedKeysFirstPage(Context context try { return service.getDeletedKeys(vaultUrl, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing deleted keys")) - .doOnSuccess(response -> logger.info("Listed deleted keys")) + .doOnRequest(ignored -> logger.verbose("Listing deleted keys")) + .doOnSuccess(response -> logger.verbose("Listed deleted keys")) .doOnError(error -> logger.warning("Failed to list deleted keys", error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1377,8 +1377,8 @@ private Mono> listKeyVersionsFirstPage(String name, try { return service.getKeyVersions(vaultUrl, name, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing key versions - {}", name)) - .doOnSuccess(response -> logger.info("Listed key versions - {}", name)) + .doOnRequest(ignored -> logger.verbose("Listing key versions - {}", name)) + .doOnSuccess(response -> logger.verbose("Listed key versions - {}", name)) .doOnError(error -> logger.warning(String.format("Failed to list key versions - %s", name), error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -1397,8 +1397,8 @@ private Mono> listKeyVersionsNextPage(String contin try { return service.getKeys(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing next key versions page - Page {} ", continuationToken)) - .doOnSuccess(response -> logger.info("Listed next key versions page - Page {} ", continuationToken)) + .doOnRequest(ignored -> logger.verbose("Listing next key versions page - Page {} ", continuationToken)) + .doOnSuccess(response -> logger.verbose("Listed next key versions page - Page {} ", continuationToken)) .doOnError(error -> logger.warning("Failed to list next key versions page - Page {} ", continuationToken, error)); } catch (RuntimeException ex) { diff --git a/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/cryptography/CryptographyServiceClient.java b/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/cryptography/CryptographyServiceClient.java index ad16654ab0b3..2be0e17c05c2 100644 --- a/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/cryptography/CryptographyServiceClient.java +++ b/sdk/keyvault/azure-security-keyvault-keys/src/main/java/com/azure/security/keyvault/keys/cryptography/CryptographyServiceClient.java @@ -68,16 +68,16 @@ private Mono> getKey(String name, String version, Context context = context == null ? Context.NONE : context; return service.getKey(vaultUrl, name, version, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving key - {}", name)) - .doOnSuccess(response -> logger.info("Retrieved key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving key - {}", name)) + .doOnSuccess(response -> logger.verbose("Retrieved key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to get key - {}", name, error)); } Mono> getSecretKey(Context context) { return service.getSecret(vaultUrl, keyName, version, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving key - {}", keyName)) - .doOnSuccess(response -> logger.info("Retrieved key - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving key - {}", keyName)) + .doOnSuccess(response -> logger.verbose("Retrieved key - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to get key - {}", keyName, error)) .flatMap((stringResponse -> { KeyVaultKey key = null; @@ -102,8 +102,8 @@ Mono> setSecretKey(SecretKey secret, Context context) { return service.setSecret(vaultUrl, secret.getName(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Setting secret - {}", secret.getName())) - .doOnSuccess(response -> logger.info("Set secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Setting secret - {}", secret.getName())) + .doOnSuccess(response -> logger.verbose("Set secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to set secret - {}", secret.getName(), error)); } @@ -138,8 +138,8 @@ Mono encrypt(EncryptOptions encryptOptions, Context context) { return service.encrypt(vaultUrl, keyName, version, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Encrypting content with algorithm - {}", algorithm)) - .doOnSuccess(response -> logger.info("Retrieved encrypted content with algorithm - {}", algorithm)) + .doOnRequest(ignored -> logger.verbose("Encrypting content with algorithm - {}", algorithm)) + .doOnSuccess(response -> logger.verbose("Retrieved encrypted content with algorithm - {}", algorithm)) .doOnError(error -> logger.warning("Failed to encrypt content with algorithm - {}", algorithm, error)) .map(keyOperationResultResponse -> { KeyOperationResult keyOperationResult = keyOperationResultResponse.getValue(); @@ -164,8 +164,8 @@ Mono decrypt(DecryptOptions decryptOptions, Context context) { return service.decrypt(vaultUrl, keyName, version, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Decrypting content with algorithm - {}", algorithm)) - .doOnSuccess(response -> logger.info("Retrieved decrypted content with algorithm - {}", algorithm)) + .doOnRequest(ignored -> logger.verbose("Decrypting content with algorithm - {}", algorithm)) + .doOnSuccess(response -> logger.verbose("Retrieved decrypted content with algorithm - {}", algorithm)) .doOnError(error -> logger.warning("Failed to decrypt content with algorithm - {}", algorithm, error)) .flatMap(keyOperationResultResponse -> Mono.just( new DecryptResult(keyOperationResultResponse.getValue().getResult(), algorithm, keyId))); @@ -176,8 +176,8 @@ Mono sign(SignatureAlgorithm algorithm, byte[] digest, Context conte context = context == null ? Context.NONE : context; return service.sign(vaultUrl, keyName, version, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Signing content with algorithm - {}", algorithm)) - .doOnSuccess(response -> logger.info("Retrieved signed content with algorithm - {}", algorithm)) + .doOnRequest(ignored -> logger.verbose("Signing content with algorithm - {}", algorithm)) + .doOnSuccess(response -> logger.verbose("Retrieved signed content with algorithm - {}", algorithm)) .doOnError(error -> logger.warning("Failed to sign content with algorithm - {}", algorithm, error)) .flatMap(keyOperationResultResponse -> Mono.just(new SignResult(keyOperationResultResponse.getValue().getResult(), algorithm, keyId))); @@ -191,8 +191,8 @@ Mono verify(SignatureAlgorithm algorithm, byte[] digest, byte[] si return service.verify(vaultUrl, keyName, version, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Verifying content with algorithm - {}", algorithm)) - .doOnSuccess(response -> logger.info("Retrieved verified content with algorithm - {}", algorithm)) + .doOnRequest(ignored -> logger.verbose("Verifying content with algorithm - {}", algorithm)) + .doOnSuccess(response -> logger.verbose("Retrieved verified content with algorithm - {}", algorithm)) .doOnError(error -> logger.warning("Failed to verify content with algorithm - {}", algorithm, error)) .flatMap(response -> Mono.just(new VerifyResult(response.getValue().getValue(), algorithm, keyId))); } @@ -205,8 +205,8 @@ Mono wrapKey(KeyWrapAlgorithm algorithm, byte[] key, Context context return service.wrapKey(vaultUrl, keyName, version, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Wrapping key content with algorithm - {}", algorithm)) - .doOnSuccess(response -> logger.info("Retrieved wrapped key content with algorithm - {}", algorithm)) + .doOnRequest(ignored -> logger.verbose("Wrapping key content with algorithm - {}", algorithm)) + .doOnSuccess(response -> logger.verbose("Retrieved wrapped key content with algorithm - {}", algorithm)) .doOnError(error -> logger.warning("Failed to verify content with algorithm - {}", algorithm, error)) .flatMap(keyOperationResultResponse -> Mono.just(new WrapResult(keyOperationResultResponse.getValue().getResult(), algorithm, keyId))); @@ -220,8 +220,8 @@ Mono unwrapKey(KeyWrapAlgorithm algorithm, byte[] encryptedKey, Co return service.unwrapKey(vaultUrl, keyName, version, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Unwrapping key content with algorithm - {}", algorithm)) - .doOnSuccess(response -> logger.info("Retrieved unwrapped key content with algorithm - {}", algorithm)) + .doOnRequest(ignored -> logger.verbose("Unwrapping key content with algorithm - {}", algorithm)) + .doOnSuccess(response -> logger.verbose("Retrieved unwrapped key content with algorithm - {}", algorithm)) .doOnError(error -> logger.warning("Failed to unwrap key content with algorithm - {}", algorithm, error)) .flatMap(response -> Mono.just(new UnwrapResult(response.getValue().getResult(), algorithm, keyId))); } diff --git a/sdk/keyvault/azure-security-keyvault-secrets/src/main/java/com/azure/security/keyvault/secrets/SecretAsyncClient.java b/sdk/keyvault/azure-security-keyvault-secrets/src/main/java/com/azure/security/keyvault/secrets/SecretAsyncClient.java index 37b77bfb805c..03bbe8139ec0 100644 --- a/sdk/keyvault/azure-security-keyvault-secrets/src/main/java/com/azure/security/keyvault/secrets/SecretAsyncClient.java +++ b/sdk/keyvault/azure-security-keyvault-secrets/src/main/java/com/azure/security/keyvault/secrets/SecretAsyncClient.java @@ -172,8 +172,8 @@ Mono> setSecretWithResponse(KeyVaultSecret secret, Cont return service.setSecret(vaultUrl, secret.getName(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Setting secret - {}", secret.getName())) - .doOnSuccess(response -> logger.info("Set secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Setting secret - {}", secret.getName())) + .doOnSuccess(response -> logger.verbose("Set secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to set secret - {}", secret.getName(), error)); } @@ -206,8 +206,8 @@ Mono> setSecretWithResponse(String name, String value, SecretRequestParameters parameters = new SecretRequestParameters().setValue(value); return service.setSecret(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Setting secret - {}", name)) - .doOnSuccess(response -> logger.info("Set secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Setting secret - {}", name)) + .doOnSuccess(response -> logger.verbose("Set secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to set secret - {}", name, error)); } @@ -271,8 +271,8 @@ Mono> getSecretWithResponse(String name, String version context = context == null ? Context.NONE : context; return service.getSecret(vaultUrl, name, version == null ? "" : version, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignoredValue -> logger.info("Retrieving secret - {}", name)) - .doOnSuccess(response -> logger.info("Retrieved secret - {}", response.getValue().getName())) + .doOnRequest(ignoredValue -> logger.verbose("Retrieving secret - {}", name)) + .doOnSuccess(response -> logger.verbose("Retrieved secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to get secret - {}", name, error)); } @@ -374,8 +374,8 @@ Mono> updateSecretPropertiesWithResponse(SecretProper return service.updateSecret(vaultUrl, secretProperties.getName(), secretProperties.getVersion(), apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Updating secret - {}", secretProperties.getName())) - .doOnSuccess(response -> logger.info("Updated secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Updating secret - {}", secretProperties.getName())) + .doOnSuccess(response -> logger.verbose("Updated secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to update secret - {}", secretProperties.getName(), error)); } @@ -454,8 +454,8 @@ private Function, Mono Mono> deleteSecretWithResponse(String name, Context context) { return service.deleteSecret(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Deleting secret - {}", name)) - .doOnSuccess(response -> logger.info("Deleted secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Deleting secret - {}", name)) + .doOnSuccess(response -> logger.verbose("Deleted secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to delete secret - {}", name, error)); } @@ -512,8 +512,8 @@ Mono> getDeletedSecretWithResponse(String name, Context context = context == null ? Context.NONE : context; return service.getDeletedSecret(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Retrieving deleted secret - {}", name)) - .doOnSuccess(response -> logger.info("Retrieved deleted secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Retrieving deleted secret - {}", name)) + .doOnSuccess(response -> logger.verbose("Retrieved deleted secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to retrieve deleted secret - {}", name, error)); } @@ -569,8 +569,8 @@ Mono> purgeDeletedSecretWithResponse(String name, Context context context = context == null ? Context.NONE : context; return service.purgeDeletedSecret(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Purging deleted secret - {}", name)) - .doOnSuccess(response -> logger.info("Purged deleted secret - {}", name)) + .doOnRequest(ignored -> logger.verbose("Purging deleted secret - {}", name)) + .doOnSuccess(response -> logger.verbose("Purged deleted secret - {}", name)) .doOnError(error -> logger.warning("Failed to purge deleted secret - {}", name, error)); } @@ -646,8 +646,8 @@ private Function, Mono> recoverDeletedSecretWithResponse(String name, Context context) { return service.recoverDeletedSecret(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Recovering deleted secret - {}", name)) - .doOnSuccess(response -> logger.info("Recovered deleted secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Recovering deleted secret - {}", name)) + .doOnSuccess(response -> logger.verbose("Recovered deleted secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to recover deleted secret - {}", name, error)); } @@ -705,8 +705,8 @@ Mono> backupSecretWithResponse(String name, Context context) { context = context == null ? Context.NONE : context; return service.backupSecret(vaultUrl, name, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Backing up secret - {}", name)) - .doOnSuccess(response -> logger.info("Backed up secret - {}", name)) + .doOnRequest(ignored -> logger.verbose("Backing up secret - {}", name)) + .doOnSuccess(response -> logger.verbose("Backed up secret - {}", name)) .doOnError(error -> logger.warning("Failed to back up secret - {}", name, error)) .flatMap(base64URLResponse -> Mono.just(new SimpleResponse(base64URLResponse.getRequest(), base64URLResponse.getStatusCode(), base64URLResponse.getHeaders(), base64URLResponse.getValue().getValue()))); @@ -764,8 +764,8 @@ Mono> restoreSecretBackupWithResponse(byte[] backup, Co SecretRestoreRequestParameters parameters = new SecretRestoreRequestParameters().setSecretBackup(backup); return service.restoreSecret(vaultUrl, apiVersion, ACCEPT_LANGUAGE, parameters, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Attempting to restore secret")) - .doOnSuccess(response -> logger.info("Restored secret - {}", response.getValue().getName())) + .doOnRequest(ignored -> logger.verbose("Attempting to restore secret")) + .doOnSuccess(response -> logger.verbose("Restored secret - {}", response.getValue().getName())) .doOnError(error -> logger.warning("Failed to restore secret", error)); } @@ -811,8 +811,8 @@ private Mono> listSecretsNextPage(String continu try { return service.getSecrets(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignoredValue -> logger.info("Retrieving the next secrets page - Page {}", continuationToken)) - .doOnSuccess(response -> logger.info("Retrieved the next secrets page - Page {}", continuationToken)) + .doOnRequest(ignoredValue -> logger.verbose("Retrieving the next secrets page - Page {}", continuationToken)) + .doOnSuccess(response -> logger.verbose("Retrieved the next secrets page - Page {}", continuationToken)) .doOnError(error -> logger.warning("Failed to retrieve the next secrets page - Page {}", continuationToken, error)); } catch (RuntimeException ex) { @@ -828,8 +828,8 @@ private Mono> listSecretsFirstPage(Context conte try { return service.getSecrets(vaultUrl, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing secrets")) - .doOnSuccess(response -> logger.info("Listed secrets")) + .doOnRequest(ignored -> logger.verbose("Listing secrets")) + .doOnSuccess(response -> logger.verbose("Listed secrets")) .doOnError(error -> logger.warning("Failed to list secrets", error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -878,9 +878,9 @@ private Mono> listDeletedSecretsNextPage(String con try { return service.getDeletedSecrets(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignoredValue -> logger.info("Retrieving the next deleted secrets page - Page {}", + .doOnRequest(ignoredValue -> logger.verbose("Retrieving the next deleted secrets page - Page {}", continuationToken)) - .doOnSuccess(response -> logger.info("Retrieved the next deleted secrets page - Page {}", + .doOnSuccess(response -> logger.verbose("Retrieved the next deleted secrets page - Page {}", continuationToken)) .doOnError(error -> logger.warning("Failed to retrieve the next deleted secrets page - Page {}", continuationToken, error)); @@ -897,8 +897,8 @@ private Mono> listDeletedSecretsFirstPage(Context c try { return service.getDeletedSecrets(vaultUrl, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing deleted secrets")) - .doOnSuccess(response -> logger.info("Listed deleted secrets")) + .doOnRequest(ignored -> logger.verbose("Listing deleted secrets")) + .doOnSuccess(response -> logger.verbose("Listed deleted secrets")) .doOnError(error -> logger.warning("Failed to list deleted secrets", error)); } catch (RuntimeException ex) { return monoError(logger, ex); @@ -951,9 +951,9 @@ private Mono> listSecretVersionsNextPage(String try { return service.getSecrets(vaultUrl, continuationToken, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignoredValue -> logger.info("Retrieving the next secrets versions page - Page {}", + .doOnRequest(ignoredValue -> logger.verbose("Retrieving the next secrets versions page - Page {}", continuationToken)) - .doOnSuccess(response -> logger.info("Retrieved the next secrets versions page - Page {}", + .doOnSuccess(response -> logger.verbose("Retrieved the next secrets versions page - Page {}", continuationToken)) .doOnError(error -> logger.warning("Failed to retrieve the next secrets versions page - Page {}", continuationToken, error)); @@ -970,8 +970,8 @@ private Mono> listSecretVersionsFirstPage(String try { return service.getSecretVersions(vaultUrl, name, DEFAULT_MAX_PAGE_RESULTS, apiVersion, ACCEPT_LANGUAGE, CONTENT_TYPE_HEADER_VALUE, context.addData(AZ_TRACING_NAMESPACE_KEY, KEYVAULT_TRACING_NAMESPACE_VALUE)) - .doOnRequest(ignored -> logger.info("Listing secret versions - {}", name)) - .doOnSuccess(response -> logger.info("Listed secret versions - {}", name)) + .doOnRequest(ignored -> logger.verbose("Listing secret versions - {}", name)) + .doOnSuccess(response -> logger.verbose("Listed secret versions - {}", name)) .doOnError(error -> logger.warning(String.format("Failed to list secret versions - {}", name), error)); } catch (RuntimeException ex) { return monoError(logger, ex);