summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGregory Wlodarek <gregory.wlodarek@mongodb.com>2023-02-16 01:20:00 +0000
committerEvergreen Agent <no-reply@evergreen.mongodb.com>2023-03-16 20:51:23 +0000
commitef5f9be5f73fe0f8653f25b80f86e9c1003daa85 (patch)
treeabbf0e1cd5066af8d65010c19be86493560818f7
parent21ee6003fe704534e63ea20d5aa0cf563da0df2f (diff)
downloadmongo-ef5f9be5f73fe0f8653f25b80f86e9c1003daa85.tar.gz
SERVER-74045 Allow turning on diagnostic log messages for validate
(cherry picked from commit 7230a2aa4f4eedcaa6a0c85c7c14bcb29c63ae93)
-rw-r--r--src/mongo/db/catalog/collection_validation.cpp4
-rw-r--r--src/mongo/db/catalog/collection_validation.h2
-rw-r--r--src/mongo/db/catalog/collection_validation_test.cpp12
-rw-r--r--src/mongo/db/catalog/index_consistency.cpp31
-rw-r--r--src/mongo/db/catalog/validate_adaptor.cpp2
-rw-r--r--src/mongo/db/catalog/validate_state.cpp4
-rw-r--r--src/mongo/db/catalog/validate_state.h16
-rw-r--r--src/mongo/db/catalog/validate_state_test.cpp24
-rw-r--r--src/mongo/db/commands/validate.cpp5
-rw-r--r--src/mongo/db/repair.cpp3
-rw-r--r--src/mongo/db/repl/idempotency_test_fixture.cpp3
-rw-r--r--src/mongo/dbtests/validate_tests.cpp72
12 files changed, 103 insertions, 75 deletions
diff --git a/src/mongo/db/catalog/collection_validation.cpp b/src/mongo/db/catalog/collection_validation.cpp
index 1780df05ee6..c445763680b 100644
--- a/src/mongo/db/catalog/collection_validation.cpp
+++ b/src/mongo/db/catalog/collection_validation.cpp
@@ -457,12 +457,12 @@ Status validate(OperationContext* opCtx,
RepairMode repairMode,
ValidateResults* results,
BSONObjBuilder* output,
- bool turnOnExtraLoggingForTest) {
+ bool logDiagnostics) {
invariant(!opCtx->lockState()->isLocked() || storageGlobalParams.repair);
// This is deliberately outside of the try-catch block, so that any errors thrown in the
// constructor fail the cmd, as opposed to returning OK with valid:false.
- ValidateState validateState(opCtx, nss, mode, repairMode, turnOnExtraLoggingForTest);
+ ValidateState validateState(opCtx, nss, mode, repairMode, logDiagnostics);
// The FCV document may not be initialized yet in repair mode.
if (repairMode == RepairMode::kNone) {
diff --git a/src/mongo/db/catalog/collection_validation.h b/src/mongo/db/catalog/collection_validation.h
index 378244f39b7..40b12b0c8c5 100644
--- a/src/mongo/db/catalog/collection_validation.h
+++ b/src/mongo/db/catalog/collection_validation.h
@@ -103,7 +103,7 @@ Status validate(OperationContext* opCtx,
RepairMode repairMode,
ValidateResults* results,
BSONObjBuilder* output,
- bool turnOnExtraLoggingForTest = false);
+ bool logDiagnostics);
/**
* Checks whether a failpoint has been hit in the above validate() code..
diff --git a/src/mongo/db/catalog/collection_validation_test.cpp b/src/mongo/db/catalog/collection_validation_test.cpp
index 22104de0ea4..b606bb6479f 100644
--- a/src/mongo/db/catalog/collection_validation_test.cpp
+++ b/src/mongo/db/catalog/collection_validation_test.cpp
@@ -104,8 +104,13 @@ void foregroundValidate(
for (auto mode : modes) {
ValidateResults validateResults;
BSONObjBuilder output;
- ASSERT_OK(CollectionValidation::validate(
- opCtx, kNss, mode, repairMode, &validateResults, &output));
+ ASSERT_OK(CollectionValidation::validate(opCtx,
+ kNss,
+ mode,
+ repairMode,
+ &validateResults,
+ &output,
+ /*logDiagnostics=*/false));
ASSERT_EQ(validateResults.valid, valid);
ASSERT_EQ(validateResults.errors.size(), static_cast<long unsigned int>(numErrors));
@@ -142,7 +147,8 @@ void backgroundValidate(OperationContext* opCtx,
CollectionValidation::ValidateMode::kBackground,
CollectionValidation::RepairMode::kNone,
&validateResults,
- &output));
+ &output,
+ /*logDiagnostics=*/false));
BSONObj obj = output.obj();
ASSERT_EQ(validateResults.valid, valid);
diff --git a/src/mongo/db/catalog/index_consistency.cpp b/src/mongo/db/catalog/index_consistency.cpp
index 2ce9a8f94e6..5a046abcf15 100644
--- a/src/mongo/db/catalog/index_consistency.cpp
+++ b/src/mongo/db/catalog/index_consistency.cpp
@@ -106,7 +106,7 @@ IndexConsistency::IndexConsistency(OperationContext* opCtx,
void IndexConsistency::addMultikeyMetadataPath(const KeyString::Value& ks, IndexInfo* indexInfo) {
auto hash = _hashKeyString(ks, indexInfo->indexNameHash);
- if (MONGO_unlikely(_validateState->extraLoggingForTest())) {
+ if (MONGO_unlikely(_validateState->logDiagnostics())) {
LOGV2(6208500,
"[validate](multikeyMetadataPath) Adding with the hash",
"hash"_attr = hash,
@@ -118,7 +118,7 @@ void IndexConsistency::addMultikeyMetadataPath(const KeyString::Value& ks, Index
void IndexConsistency::removeMultikeyMetadataPath(const KeyString::Value& ks,
IndexInfo* indexInfo) {
auto hash = _hashKeyString(ks, indexInfo->indexNameHash);
- if (MONGO_unlikely(_validateState->extraLoggingForTest())) {
+ if (MONGO_unlikely(_validateState->logDiagnostics())) {
LOGV2(6208501,
"[validate](multikeyMetadataPath) Removing with the hash",
"hash"_attr = hash,
@@ -132,9 +132,26 @@ size_t IndexConsistency::getMultikeyMetadataPathCount(IndexInfo* indexInfo) {
}
bool IndexConsistency::haveEntryMismatch() const {
- return std::any_of(_indexKeyBuckets.begin(),
- _indexKeyBuckets.end(),
- [](const IndexKeyBucket& bucket) -> bool { return bucket.indexKeyCount; });
+ bool haveMismatch =
+ std::any_of(_indexKeyBuckets.begin(),
+ _indexKeyBuckets.end(),
+ [](const IndexKeyBucket& bucket) -> bool { return bucket.indexKeyCount; });
+
+ if (haveMismatch && _validateState->logDiagnostics()) {
+ for (size_t i = 0; i < _indexKeyBuckets.size(); i++) {
+ if (_indexKeyBuckets[i].indexKeyCount == 0) {
+ continue;
+ }
+
+ LOGV2(7404500,
+ "[validate](bucket entry mismatch)",
+ "hash"_attr = i,
+ "indexKeyCount"_attr = _indexKeyBuckets[i].indexKeyCount,
+ "bucketBytesSize"_attr = _indexKeyBuckets[i].bucketSizeBytes);
+ }
+ }
+
+ return haveMismatch;
}
void IndexConsistency::setSecondPhase() {
@@ -377,7 +394,7 @@ void IndexConsistency::addDocKey(OperationContext* opCtx,
upper.bucketSizeBytes += ks.getSize();
indexInfo->numRecords++;
- if (MONGO_unlikely(_validateState->extraLoggingForTest())) {
+ if (MONGO_unlikely(_validateState->logDiagnostics())) {
LOGV2(4666602,
"[validate](record) Adding with hashes",
"hashUpper"_attr = hashUpper,
@@ -430,7 +447,7 @@ void IndexConsistency::addIndexKey(OperationContext* opCtx,
upper.bucketSizeBytes += ks.getSize();
indexInfo->numKeys++;
- if (MONGO_unlikely(_validateState->extraLoggingForTest())) {
+ if (MONGO_unlikely(_validateState->logDiagnostics())) {
LOGV2(4666603,
"[validate](index) Adding with hashes",
"hashUpper"_attr = hashUpper,
diff --git a/src/mongo/db/catalog/validate_adaptor.cpp b/src/mongo/db/catalog/validate_adaptor.cpp
index 46efad6aecf..7fc9744c5f7 100644
--- a/src/mongo/db/catalog/validate_adaptor.cpp
+++ b/src/mongo/db/catalog/validate_adaptor.cpp
@@ -81,7 +81,7 @@ Status ValidateAdaptor::validateRecord(OperationContext* opCtx,
BSONObj recordBson = record.toBson();
*dataSize = recordBson.objsize();
- if (MONGO_unlikely(_validateState->extraLoggingForTest())) {
+ if (MONGO_unlikely(_validateState->logDiagnostics())) {
LOGV2(4666601, "[validate]", "recordId"_attr = recordId, "recordData"_attr = recordBson);
}
diff --git a/src/mongo/db/catalog/validate_state.cpp b/src/mongo/db/catalog/validate_state.cpp
index 7962a0fc167..a299d774cc9 100644
--- a/src/mongo/db/catalog/validate_state.cpp
+++ b/src/mongo/db/catalog/validate_state.cpp
@@ -54,12 +54,12 @@ ValidateState::ValidateState(OperationContext* opCtx,
const NamespaceString& nss,
ValidateMode mode,
RepairMode repairMode,
- bool turnOnExtraLoggingForTest)
+ bool logDiagnostics)
: _nss(nss),
_mode(mode),
_repairMode(repairMode),
_dataThrottle(opCtx),
- _extraLoggingForTest(turnOnExtraLoggingForTest) {
+ _logDiagnostics(logDiagnostics) {
// Subsequent re-locks will use the UUID when 'background' is true.
if (isBackground()) {
diff --git a/src/mongo/db/catalog/validate_state.h b/src/mongo/db/catalog/validate_state.h
index 72f8da3019e..8144ddb5cc3 100644
--- a/src/mongo/db/catalog/validate_state.h
+++ b/src/mongo/db/catalog/validate_state.h
@@ -55,15 +55,11 @@ class ValidateState {
ValidateState& operator=(const ValidateState&) = delete;
public:
- /**
- * 'turnOnExtraLoggingForTest' turns on extra logging for test debugging. This parameter is for
- * unit testing only.
- */
ValidateState(OperationContext* opCtx,
const NamespaceString& nss,
ValidateMode mode,
RepairMode repairMode,
- bool turnOnExtraLoggingForTest = false);
+ bool logDiagnostics);
const NamespaceString& nss() const {
return _nss;
@@ -166,11 +162,9 @@ public:
/**
* Indicates whether extra logging should occur during validation.
- *
- * This is for unit testing only. Intended to improve diagnosibility.
*/
- bool extraLoggingForTest() {
- return _extraLoggingForTest;
+ bool logDiagnostics() {
+ return _logDiagnostics;
}
boost::optional<Timestamp> getValidateTimestamp() {
@@ -250,8 +244,8 @@ private:
// Used to detect when the catalog is re-opened while yielding locks.
uint64_t _catalogGeneration;
- // Can be set by unit tests to obtain better insight into what validate sees/does.
- bool _extraLoggingForTest;
+ // Can be set to obtain better insight into what validate sees/does.
+ bool _logDiagnostics;
boost::optional<Timestamp> _validateTs = boost::none;
};
diff --git a/src/mongo/db/catalog/validate_state_test.cpp b/src/mongo/db/catalog/validate_state_test.cpp
index bedbec3b99e..d4951400a58 100644
--- a/src/mongo/db/catalog/validate_state_test.cpp
+++ b/src/mongo/db/catalog/validate_state_test.cpp
@@ -156,7 +156,8 @@ TEST_F(ValidateStateTest, NonExistentCollectionShouldThrowNamespaceNotFoundError
CollectionValidation::ValidateState(opCtx,
kNss,
CollectionValidation::ValidateMode::kForeground,
- CollectionValidation::RepairMode::kNone),
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false),
AssertionException,
ErrorCodes::NamespaceNotFound);
@@ -164,7 +165,8 @@ TEST_F(ValidateStateTest, NonExistentCollectionShouldThrowNamespaceNotFoundError
CollectionValidation::ValidateState(opCtx,
kNss,
CollectionValidation::ValidateMode::kBackground,
- CollectionValidation::RepairMode::kNone),
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false),
AssertionException,
ErrorCodes::NamespaceNotFound);
}
@@ -183,7 +185,8 @@ TEST_F(ValidateStateTest, UncheckpointedCollectionShouldBeAbleToInitializeCursor
opCtx,
kNss,
CollectionValidation::ValidateMode::kBackground,
- CollectionValidation::RepairMode::kNone);
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false);
// Assert that cursors are able to created on the new collection.
validateState.initializeCursors(opCtx);
// There should only be a first record id if cursors were initialized successfully.
@@ -210,7 +213,8 @@ TEST_F(ValidateStateTest, OpenCursorsOnAllIndexes) {
opCtx,
kNss,
CollectionValidation::ValidateMode::kForeground,
- CollectionValidation::RepairMode::kNone);
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false);
validateState.initializeCursors(opCtx);
// Make sure all of the indexes were found and cursors opened against them. Including the
@@ -228,7 +232,8 @@ TEST_F(ValidateStateTest, OpenCursorsOnAllIndexes) {
opCtx,
kNss,
CollectionValidation::ValidateMode::kForeground,
- CollectionValidation::RepairMode::kNone);
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false);
validateState.initializeCursors(opCtx);
ASSERT_EQ(validateState.getIndexes().size(), 5);
}
@@ -255,7 +260,8 @@ TEST_F(ValidateStateTest, OpenCursorsOnAllIndexesWithBackground) {
opCtx,
kNss,
CollectionValidation::ValidateMode::kBackground,
- CollectionValidation::RepairMode::kNone);
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false);
validateState.initializeCursors(opCtx);
// We should be able to open a cursor on each index.
@@ -292,7 +298,8 @@ TEST_F(ValidateStateTest, CursorsAreNotOpenedAgainstCheckpointedIndexesThatWereL
opCtx,
kNss,
CollectionValidation::ValidateMode::kBackground,
- CollectionValidation::RepairMode::kNone);
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false);
validateState.initializeCursors(opCtx);
ASSERT_EQ(validateState.getIndexes().size(), 3);
}
@@ -305,7 +312,8 @@ TEST_F(ValidateStateTest, CursorsAreNotOpenedAgainstCheckpointedIndexesThatWereL
opCtx,
kNss,
CollectionValidation::ValidateMode::kBackground,
- CollectionValidation::RepairMode::kNone);
+ CollectionValidation::RepairMode::kNone,
+ /*logDiagnostics=*/false);
validateState.initializeCursors(opCtx);
ASSERT_EQ(validateState.getIndexes().size(), 3);
}
diff --git a/src/mongo/db/commands/validate.cpp b/src/mongo/db/commands/validate.cpp
index f00ed058f94..3f73067a169 100644
--- a/src/mongo/db/commands/validate.cpp
+++ b/src/mongo/db/commands/validate.cpp
@@ -123,6 +123,7 @@ public:
const NamespaceString nss(CommandHelpers::parseNsCollectionRequired(dbname, cmdObj));
bool background = cmdObj["background"].trueValue();
+ bool logDiagnostics = cmdObj["logDiagnostics"].trueValue();
// Background validation is not supported on the ephemeralForTest storage engine due to its
// lack of support for timestamps. Switch the mode to foreground validation instead.
@@ -246,8 +247,8 @@ public:
}
ValidateResults validateResults;
- Status status =
- CollectionValidation::validate(opCtx, nss, mode, repairMode, &validateResults, &result);
+ Status status = CollectionValidation::validate(
+ opCtx, nss, mode, repairMode, &validateResults, &result, logDiagnostics);
if (!status.isOK()) {
return CommandHelpers::appendCommandStatusNoThrow(result, status);
}
diff --git a/src/mongo/db/repair.cpp b/src/mongo/db/repair.cpp
index 5288a6e9cc6..da5fe9795c2 100644
--- a/src/mongo/db/repair.cpp
+++ b/src/mongo/db/repair.cpp
@@ -230,7 +230,8 @@ Status repairCollection(OperationContext* opCtx,
CollectionValidation::ValidateMode::kForegroundFullIndexOnly,
CollectionValidation::RepairMode::kFixErrors,
&validateResults,
- &output);
+ &output,
+ /*logDiagnostics=*/false);
if (!status.isOK()) {
return status;
}
diff --git a/src/mongo/db/repl/idempotency_test_fixture.cpp b/src/mongo/db/repl/idempotency_test_fixture.cpp
index 2a35a72e100..a772efa6f17 100644
--- a/src/mongo/db/repl/idempotency_test_fixture.cpp
+++ b/src/mongo/db/repl/idempotency_test_fixture.cpp
@@ -405,7 +405,8 @@ CollectionState IdempotencyTest::validate(const NamespaceString& nss) {
CollectionValidation::ValidateMode::kForegroundFull,
CollectionValidation::RepairMode::kNone,
&validateResults,
- &bob));
+ &bob,
+ /*logDiagnostics=*/false));
ASSERT_TRUE(validateResults.valid);
}
diff --git a/src/mongo/dbtests/validate_tests.cpp b/src/mongo/dbtests/validate_tests.cpp
index 46ea3e941db..f44ed9daafa 100644
--- a/src/mongo/dbtests/validate_tests.cpp
+++ b/src/mongo/dbtests/validate_tests.cpp
@@ -53,7 +53,7 @@ using std::unique_ptr;
namespace {
const auto kIndexVersion = IndexDescriptor::IndexVersion::kV2;
-const bool kTurnOnExtraLoggingForTest = true;
+const bool kLogDiagnostics = true;
} // namespace
@@ -124,7 +124,7 @@ protected:
BSONObjBuilder output;
ASSERT_OK(CollectionValidation::validate(
- &_opCtx, _nss, mode, repairMode, &results, &output, kTurnOnExtraLoggingForTest));
+ &_opCtx, _nss, mode, repairMode, &results, &output, kLogDiagnostics));
// Check if errors are reported if and only if valid is set to false.
ASSERT_EQ(results.valid, results.errors.empty());
@@ -1177,7 +1177,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1294,7 +1294,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1383,7 +1383,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1495,7 +1495,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1524,7 +1524,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1560,7 +1560,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1678,7 +1678,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1709,7 +1709,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1741,7 +1741,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1831,7 +1831,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1862,7 +1862,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -1893,7 +1893,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2081,7 +2081,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2111,7 +2111,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2230,7 +2230,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2261,7 +2261,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2293,7 +2293,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2705,7 +2705,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2773,7 +2773,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2804,7 +2804,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2839,7 +2839,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -2870,7 +2870,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3035,7 +3035,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3064,7 +3064,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3094,7 +3094,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3238,7 +3238,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3267,7 +3267,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3296,7 +3296,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3401,7 +3401,7 @@ public:
CollectionValidation::RepairMode::kAdjustMultikey,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3434,7 +3434,7 @@ public:
CollectionValidation::RepairMode::kAdjustMultikey,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3498,7 +3498,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3598,7 +3598,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3695,7 +3695,7 @@ public:
CollectionValidation::RepairMode::kNone,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);
@@ -3724,7 +3724,7 @@ public:
CollectionValidation::RepairMode::kFixErrors,
&results,
&output,
- kTurnOnExtraLoggingForTest));
+ kLogDiagnostics));
auto dumpOnErrorGuard = makeGuard([&] {
StorageDebugUtil::printValidateResults(results);