diff options
author | Gregory Wlodarek <gregory.wlodarek@mongodb.com> | 2023-02-16 01:20:00 +0000 |
---|---|---|
committer | Evergreen Agent <no-reply@evergreen.mongodb.com> | 2023-03-16 20:51:23 +0000 |
commit | ef5f9be5f73fe0f8653f25b80f86e9c1003daa85 (patch) | |
tree | abbf0e1cd5066af8d65010c19be86493560818f7 | |
parent | 21ee6003fe704534e63ea20d5aa0cf563da0df2f (diff) | |
download | mongo-ef5f9be5f73fe0f8653f25b80f86e9c1003daa85.tar.gz |
SERVER-74045 Allow turning on diagnostic log messages for validate
(cherry picked from commit 7230a2aa4f4eedcaa6a0c85c7c14bcb29c63ae93)
-rw-r--r-- | src/mongo/db/catalog/collection_validation.cpp | 4 | ||||
-rw-r--r-- | src/mongo/db/catalog/collection_validation.h | 2 | ||||
-rw-r--r-- | src/mongo/db/catalog/collection_validation_test.cpp | 12 | ||||
-rw-r--r-- | src/mongo/db/catalog/index_consistency.cpp | 31 | ||||
-rw-r--r-- | src/mongo/db/catalog/validate_adaptor.cpp | 2 | ||||
-rw-r--r-- | src/mongo/db/catalog/validate_state.cpp | 4 | ||||
-rw-r--r-- | src/mongo/db/catalog/validate_state.h | 16 | ||||
-rw-r--r-- | src/mongo/db/catalog/validate_state_test.cpp | 24 | ||||
-rw-r--r-- | src/mongo/db/commands/validate.cpp | 5 | ||||
-rw-r--r-- | src/mongo/db/repair.cpp | 3 | ||||
-rw-r--r-- | src/mongo/db/repl/idempotency_test_fixture.cpp | 3 | ||||
-rw-r--r-- | src/mongo/dbtests/validate_tests.cpp | 72 |
12 files changed, 103 insertions, 75 deletions
diff --git a/src/mongo/db/catalog/collection_validation.cpp b/src/mongo/db/catalog/collection_validation.cpp index 1780df05ee6..c445763680b 100644 --- a/src/mongo/db/catalog/collection_validation.cpp +++ b/src/mongo/db/catalog/collection_validation.cpp @@ -457,12 +457,12 @@ Status validate(OperationContext* opCtx, RepairMode repairMode, ValidateResults* results, BSONObjBuilder* output, - bool turnOnExtraLoggingForTest) { + bool logDiagnostics) { invariant(!opCtx->lockState()->isLocked() || storageGlobalParams.repair); // This is deliberately outside of the try-catch block, so that any errors thrown in the // constructor fail the cmd, as opposed to returning OK with valid:false. - ValidateState validateState(opCtx, nss, mode, repairMode, turnOnExtraLoggingForTest); + ValidateState validateState(opCtx, nss, mode, repairMode, logDiagnostics); // The FCV document may not be initialized yet in repair mode. if (repairMode == RepairMode::kNone) { diff --git a/src/mongo/db/catalog/collection_validation.h b/src/mongo/db/catalog/collection_validation.h index 378244f39b7..40b12b0c8c5 100644 --- a/src/mongo/db/catalog/collection_validation.h +++ b/src/mongo/db/catalog/collection_validation.h @@ -103,7 +103,7 @@ Status validate(OperationContext* opCtx, RepairMode repairMode, ValidateResults* results, BSONObjBuilder* output, - bool turnOnExtraLoggingForTest = false); + bool logDiagnostics); /** * Checks whether a failpoint has been hit in the above validate() code.. diff --git a/src/mongo/db/catalog/collection_validation_test.cpp b/src/mongo/db/catalog/collection_validation_test.cpp index 22104de0ea4..b606bb6479f 100644 --- a/src/mongo/db/catalog/collection_validation_test.cpp +++ b/src/mongo/db/catalog/collection_validation_test.cpp @@ -104,8 +104,13 @@ void foregroundValidate( for (auto mode : modes) { ValidateResults validateResults; BSONObjBuilder output; - ASSERT_OK(CollectionValidation::validate( - opCtx, kNss, mode, repairMode, &validateResults, &output)); + ASSERT_OK(CollectionValidation::validate(opCtx, + kNss, + mode, + repairMode, + &validateResults, + &output, + /*logDiagnostics=*/false)); ASSERT_EQ(validateResults.valid, valid); ASSERT_EQ(validateResults.errors.size(), static_cast<long unsigned int>(numErrors)); @@ -142,7 +147,8 @@ void backgroundValidate(OperationContext* opCtx, CollectionValidation::ValidateMode::kBackground, CollectionValidation::RepairMode::kNone, &validateResults, - &output)); + &output, + /*logDiagnostics=*/false)); BSONObj obj = output.obj(); ASSERT_EQ(validateResults.valid, valid); diff --git a/src/mongo/db/catalog/index_consistency.cpp b/src/mongo/db/catalog/index_consistency.cpp index 2ce9a8f94e6..5a046abcf15 100644 --- a/src/mongo/db/catalog/index_consistency.cpp +++ b/src/mongo/db/catalog/index_consistency.cpp @@ -106,7 +106,7 @@ IndexConsistency::IndexConsistency(OperationContext* opCtx, void IndexConsistency::addMultikeyMetadataPath(const KeyString::Value& ks, IndexInfo* indexInfo) { auto hash = _hashKeyString(ks, indexInfo->indexNameHash); - if (MONGO_unlikely(_validateState->extraLoggingForTest())) { + if (MONGO_unlikely(_validateState->logDiagnostics())) { LOGV2(6208500, "[validate](multikeyMetadataPath) Adding with the hash", "hash"_attr = hash, @@ -118,7 +118,7 @@ void IndexConsistency::addMultikeyMetadataPath(const KeyString::Value& ks, Index void IndexConsistency::removeMultikeyMetadataPath(const KeyString::Value& ks, IndexInfo* indexInfo) { auto hash = _hashKeyString(ks, indexInfo->indexNameHash); - if (MONGO_unlikely(_validateState->extraLoggingForTest())) { + if (MONGO_unlikely(_validateState->logDiagnostics())) { LOGV2(6208501, "[validate](multikeyMetadataPath) Removing with the hash", "hash"_attr = hash, @@ -132,9 +132,26 @@ size_t IndexConsistency::getMultikeyMetadataPathCount(IndexInfo* indexInfo) { } bool IndexConsistency::haveEntryMismatch() const { - return std::any_of(_indexKeyBuckets.begin(), - _indexKeyBuckets.end(), - [](const IndexKeyBucket& bucket) -> bool { return bucket.indexKeyCount; }); + bool haveMismatch = + std::any_of(_indexKeyBuckets.begin(), + _indexKeyBuckets.end(), + [](const IndexKeyBucket& bucket) -> bool { return bucket.indexKeyCount; }); + + if (haveMismatch && _validateState->logDiagnostics()) { + for (size_t i = 0; i < _indexKeyBuckets.size(); i++) { + if (_indexKeyBuckets[i].indexKeyCount == 0) { + continue; + } + + LOGV2(7404500, + "[validate](bucket entry mismatch)", + "hash"_attr = i, + "indexKeyCount"_attr = _indexKeyBuckets[i].indexKeyCount, + "bucketBytesSize"_attr = _indexKeyBuckets[i].bucketSizeBytes); + } + } + + return haveMismatch; } void IndexConsistency::setSecondPhase() { @@ -377,7 +394,7 @@ void IndexConsistency::addDocKey(OperationContext* opCtx, upper.bucketSizeBytes += ks.getSize(); indexInfo->numRecords++; - if (MONGO_unlikely(_validateState->extraLoggingForTest())) { + if (MONGO_unlikely(_validateState->logDiagnostics())) { LOGV2(4666602, "[validate](record) Adding with hashes", "hashUpper"_attr = hashUpper, @@ -430,7 +447,7 @@ void IndexConsistency::addIndexKey(OperationContext* opCtx, upper.bucketSizeBytes += ks.getSize(); indexInfo->numKeys++; - if (MONGO_unlikely(_validateState->extraLoggingForTest())) { + if (MONGO_unlikely(_validateState->logDiagnostics())) { LOGV2(4666603, "[validate](index) Adding with hashes", "hashUpper"_attr = hashUpper, diff --git a/src/mongo/db/catalog/validate_adaptor.cpp b/src/mongo/db/catalog/validate_adaptor.cpp index 46efad6aecf..7fc9744c5f7 100644 --- a/src/mongo/db/catalog/validate_adaptor.cpp +++ b/src/mongo/db/catalog/validate_adaptor.cpp @@ -81,7 +81,7 @@ Status ValidateAdaptor::validateRecord(OperationContext* opCtx, BSONObj recordBson = record.toBson(); *dataSize = recordBson.objsize(); - if (MONGO_unlikely(_validateState->extraLoggingForTest())) { + if (MONGO_unlikely(_validateState->logDiagnostics())) { LOGV2(4666601, "[validate]", "recordId"_attr = recordId, "recordData"_attr = recordBson); } diff --git a/src/mongo/db/catalog/validate_state.cpp b/src/mongo/db/catalog/validate_state.cpp index 7962a0fc167..a299d774cc9 100644 --- a/src/mongo/db/catalog/validate_state.cpp +++ b/src/mongo/db/catalog/validate_state.cpp @@ -54,12 +54,12 @@ ValidateState::ValidateState(OperationContext* opCtx, const NamespaceString& nss, ValidateMode mode, RepairMode repairMode, - bool turnOnExtraLoggingForTest) + bool logDiagnostics) : _nss(nss), _mode(mode), _repairMode(repairMode), _dataThrottle(opCtx), - _extraLoggingForTest(turnOnExtraLoggingForTest) { + _logDiagnostics(logDiagnostics) { // Subsequent re-locks will use the UUID when 'background' is true. if (isBackground()) { diff --git a/src/mongo/db/catalog/validate_state.h b/src/mongo/db/catalog/validate_state.h index 72f8da3019e..8144ddb5cc3 100644 --- a/src/mongo/db/catalog/validate_state.h +++ b/src/mongo/db/catalog/validate_state.h @@ -55,15 +55,11 @@ class ValidateState { ValidateState& operator=(const ValidateState&) = delete; public: - /** - * 'turnOnExtraLoggingForTest' turns on extra logging for test debugging. This parameter is for - * unit testing only. - */ ValidateState(OperationContext* opCtx, const NamespaceString& nss, ValidateMode mode, RepairMode repairMode, - bool turnOnExtraLoggingForTest = false); + bool logDiagnostics); const NamespaceString& nss() const { return _nss; @@ -166,11 +162,9 @@ public: /** * Indicates whether extra logging should occur during validation. - * - * This is for unit testing only. Intended to improve diagnosibility. */ - bool extraLoggingForTest() { - return _extraLoggingForTest; + bool logDiagnostics() { + return _logDiagnostics; } boost::optional<Timestamp> getValidateTimestamp() { @@ -250,8 +244,8 @@ private: // Used to detect when the catalog is re-opened while yielding locks. uint64_t _catalogGeneration; - // Can be set by unit tests to obtain better insight into what validate sees/does. - bool _extraLoggingForTest; + // Can be set to obtain better insight into what validate sees/does. + bool _logDiagnostics; boost::optional<Timestamp> _validateTs = boost::none; }; diff --git a/src/mongo/db/catalog/validate_state_test.cpp b/src/mongo/db/catalog/validate_state_test.cpp index bedbec3b99e..d4951400a58 100644 --- a/src/mongo/db/catalog/validate_state_test.cpp +++ b/src/mongo/db/catalog/validate_state_test.cpp @@ -156,7 +156,8 @@ TEST_F(ValidateStateTest, NonExistentCollectionShouldThrowNamespaceNotFoundError CollectionValidation::ValidateState(opCtx, kNss, CollectionValidation::ValidateMode::kForeground, - CollectionValidation::RepairMode::kNone), + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false), AssertionException, ErrorCodes::NamespaceNotFound); @@ -164,7 +165,8 @@ TEST_F(ValidateStateTest, NonExistentCollectionShouldThrowNamespaceNotFoundError CollectionValidation::ValidateState(opCtx, kNss, CollectionValidation::ValidateMode::kBackground, - CollectionValidation::RepairMode::kNone), + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false), AssertionException, ErrorCodes::NamespaceNotFound); } @@ -183,7 +185,8 @@ TEST_F(ValidateStateTest, UncheckpointedCollectionShouldBeAbleToInitializeCursor opCtx, kNss, CollectionValidation::ValidateMode::kBackground, - CollectionValidation::RepairMode::kNone); + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false); // Assert that cursors are able to created on the new collection. validateState.initializeCursors(opCtx); // There should only be a first record id if cursors were initialized successfully. @@ -210,7 +213,8 @@ TEST_F(ValidateStateTest, OpenCursorsOnAllIndexes) { opCtx, kNss, CollectionValidation::ValidateMode::kForeground, - CollectionValidation::RepairMode::kNone); + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false); validateState.initializeCursors(opCtx); // Make sure all of the indexes were found and cursors opened against them. Including the @@ -228,7 +232,8 @@ TEST_F(ValidateStateTest, OpenCursorsOnAllIndexes) { opCtx, kNss, CollectionValidation::ValidateMode::kForeground, - CollectionValidation::RepairMode::kNone); + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false); validateState.initializeCursors(opCtx); ASSERT_EQ(validateState.getIndexes().size(), 5); } @@ -255,7 +260,8 @@ TEST_F(ValidateStateTest, OpenCursorsOnAllIndexesWithBackground) { opCtx, kNss, CollectionValidation::ValidateMode::kBackground, - CollectionValidation::RepairMode::kNone); + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false); validateState.initializeCursors(opCtx); // We should be able to open a cursor on each index. @@ -292,7 +298,8 @@ TEST_F(ValidateStateTest, CursorsAreNotOpenedAgainstCheckpointedIndexesThatWereL opCtx, kNss, CollectionValidation::ValidateMode::kBackground, - CollectionValidation::RepairMode::kNone); + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false); validateState.initializeCursors(opCtx); ASSERT_EQ(validateState.getIndexes().size(), 3); } @@ -305,7 +312,8 @@ TEST_F(ValidateStateTest, CursorsAreNotOpenedAgainstCheckpointedIndexesThatWereL opCtx, kNss, CollectionValidation::ValidateMode::kBackground, - CollectionValidation::RepairMode::kNone); + CollectionValidation::RepairMode::kNone, + /*logDiagnostics=*/false); validateState.initializeCursors(opCtx); ASSERT_EQ(validateState.getIndexes().size(), 3); } diff --git a/src/mongo/db/commands/validate.cpp b/src/mongo/db/commands/validate.cpp index f00ed058f94..3f73067a169 100644 --- a/src/mongo/db/commands/validate.cpp +++ b/src/mongo/db/commands/validate.cpp @@ -123,6 +123,7 @@ public: const NamespaceString nss(CommandHelpers::parseNsCollectionRequired(dbname, cmdObj)); bool background = cmdObj["background"].trueValue(); + bool logDiagnostics = cmdObj["logDiagnostics"].trueValue(); // Background validation is not supported on the ephemeralForTest storage engine due to its // lack of support for timestamps. Switch the mode to foreground validation instead. @@ -246,8 +247,8 @@ public: } ValidateResults validateResults; - Status status = - CollectionValidation::validate(opCtx, nss, mode, repairMode, &validateResults, &result); + Status status = CollectionValidation::validate( + opCtx, nss, mode, repairMode, &validateResults, &result, logDiagnostics); if (!status.isOK()) { return CommandHelpers::appendCommandStatusNoThrow(result, status); } diff --git a/src/mongo/db/repair.cpp b/src/mongo/db/repair.cpp index 5288a6e9cc6..da5fe9795c2 100644 --- a/src/mongo/db/repair.cpp +++ b/src/mongo/db/repair.cpp @@ -230,7 +230,8 @@ Status repairCollection(OperationContext* opCtx, CollectionValidation::ValidateMode::kForegroundFullIndexOnly, CollectionValidation::RepairMode::kFixErrors, &validateResults, - &output); + &output, + /*logDiagnostics=*/false); if (!status.isOK()) { return status; } diff --git a/src/mongo/db/repl/idempotency_test_fixture.cpp b/src/mongo/db/repl/idempotency_test_fixture.cpp index 2a35a72e100..a772efa6f17 100644 --- a/src/mongo/db/repl/idempotency_test_fixture.cpp +++ b/src/mongo/db/repl/idempotency_test_fixture.cpp @@ -405,7 +405,8 @@ CollectionState IdempotencyTest::validate(const NamespaceString& nss) { CollectionValidation::ValidateMode::kForegroundFull, CollectionValidation::RepairMode::kNone, &validateResults, - &bob)); + &bob, + /*logDiagnostics=*/false)); ASSERT_TRUE(validateResults.valid); } diff --git a/src/mongo/dbtests/validate_tests.cpp b/src/mongo/dbtests/validate_tests.cpp index 46ea3e941db..f44ed9daafa 100644 --- a/src/mongo/dbtests/validate_tests.cpp +++ b/src/mongo/dbtests/validate_tests.cpp @@ -53,7 +53,7 @@ using std::unique_ptr; namespace { const auto kIndexVersion = IndexDescriptor::IndexVersion::kV2; -const bool kTurnOnExtraLoggingForTest = true; +const bool kLogDiagnostics = true; } // namespace @@ -124,7 +124,7 @@ protected: BSONObjBuilder output; ASSERT_OK(CollectionValidation::validate( - &_opCtx, _nss, mode, repairMode, &results, &output, kTurnOnExtraLoggingForTest)); + &_opCtx, _nss, mode, repairMode, &results, &output, kLogDiagnostics)); // Check if errors are reported if and only if valid is set to false. ASSERT_EQ(results.valid, results.errors.empty()); @@ -1177,7 +1177,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1294,7 +1294,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1383,7 +1383,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1495,7 +1495,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1524,7 +1524,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1560,7 +1560,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1678,7 +1678,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1709,7 +1709,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1741,7 +1741,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1831,7 +1831,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1862,7 +1862,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -1893,7 +1893,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2081,7 +2081,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2111,7 +2111,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2230,7 +2230,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2261,7 +2261,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2293,7 +2293,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2705,7 +2705,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2773,7 +2773,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2804,7 +2804,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2839,7 +2839,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -2870,7 +2870,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3035,7 +3035,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3064,7 +3064,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3094,7 +3094,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3238,7 +3238,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3267,7 +3267,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3296,7 +3296,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3401,7 +3401,7 @@ public: CollectionValidation::RepairMode::kAdjustMultikey, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3434,7 +3434,7 @@ public: CollectionValidation::RepairMode::kAdjustMultikey, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3498,7 +3498,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3598,7 +3598,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3695,7 +3695,7 @@ public: CollectionValidation::RepairMode::kNone, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); @@ -3724,7 +3724,7 @@ public: CollectionValidation::RepairMode::kFixErrors, &results, &output, - kTurnOnExtraLoggingForTest)); + kLogDiagnostics)); auto dumpOnErrorGuard = makeGuard([&] { StorageDebugUtil::printValidateResults(results); |