[TOC]
Logging used to be done using Android's android.util.Log.
A wrapper on that is now available: org.chromium.base.Log. It is designed to write logs as belonging to logical groups going beyond single classes, and to make it easy to switch logging on or off for individual groups.
Usage:
private static final String TAG = "YourModuleTag";
...
Log.i(TAG, "Logged INFO message.");
Log.d(TAG, "Some DEBUG info: %s", data);
Output:
I/cr_YourModuleTag: ( 999): Logged INFO message
D/cr_YourModuleTag: ( 999): [MyClass.java:42] Some DEBUG info: data.toString
Here, TAG will be a feature or package name, "MediaRemote" or "NFC" for example. In most cases, the class name is not needed. It will be prepended by the "cr_" prefix to make obvious which logs are coming from Chrome.
-
Log.v
andLog.d
Calls made usingorg.chromium.base.Log
are stripped out of production binaries using Proguard. There is no way to get those logs in release builds. -
The file name and line number will be prepended to the log message. For higher priority logs, those are not added for performance concerns.
As with android.util.Log
, putting a throwable as last parameter will dump the
corresponding stack trace:
Log.i(TAG, "An error happened: %s", e)
I/cr_YourModuleTag: ( 999): An error happened: This is the exception's message
I/cr_YourModuleTag: ( 999): java.lang.Exception: This is the exception's message
I/cr_YourModuleTag: ( 999): at foo.bar.MyClass.test(MyClass.java:42)
I/cr_YourModuleTag: ( 999): ...
Having the exception as last parameter doesn't prevent it from being used for string formatting.
This is a huge concern, because other applications can access the log and extract a lot of data from your own by doing so. Even if JellyBean restricted this, people are going to run your application on rooted devices and allow some apps to access it. Also anyone with USB access to the device can use ADB to get the full logcat and get the same data right now.
If you really need to print something, print a series of Xs instead (e.g. "XXXXXX"), or print a truncated hash of the data instead. Truncation is required to make it harder for an attacker to recover the full data through rainbow tables and similar methods.
Similarly, avoid dumping API keys, cookies, IP addresses, URLs, page content, etc...
The log methods are removed in release builds using Proguard. Because log messages might not be written, the cost of creating them should also be avoided. This can be done using three complementary ways:
// BAD
Log.d(TAG, "I " + preference + " writing logs.");
// BETTER
Log.d(TAG, "I %s writing logs.", preference);
Proguard removes the method call itself, but doesn't do anything about the
arguments. The method's arguments will still be computed and provided as
input. The first call above will always lead to the creation of a
StringBuilder
and a few concatenations, while the second just passes the
arguments and won't need that.
Sometimes the values to log aren't readily available and need to be computed specially. This should be avoided when logging is disabled.
...
if (Log.isLoggable(TAG, Log.INFO)) {
Log.i(TAG, createThatExpensiveLogMessage(activity))
}
Because the variable is a static final
that can be evaluated at compile
time, the Java compiler will optimize out all guarded calls from the
generated .class
file. Changing it however requires editing each of the
files for which debug should be enabled and recompiling.
This is still related to the global fixed-sized kernel buffer used to keep all logs. Try to make your log information as terse as possible. This reduces the risk of pushing interesting log data out of the buffer when something really nasty happens. It's really better to have a single-line log message, than several ones. I.e. don't use:
Log.GROUP.d(TAG, "field1 = %s", value1);
Log.GROUP.d(TAG, "field2 = %s", value2);
Log.GROUP.d(TAG, "field3 = %s", value3);
Instead, write this as:
Log.d(TAG, "field1 = %s, field2 = %s, field3 = %s", value1, value2, value3);
That doesn't seem to be much different if you count overall character counts, but each independent log entry also implies a small, but non-trivial header, in the kernel log buffer. And since every byte count, you can also try something even shorter, as in:
Log.d(TAG, "fields [%s,%s,%s]", value1, value2, value3);
Logcat allows filtering by specifying tags and the associated level:
adb logcat [TAG_EXPR:LEVEL]...
adb logcat cr_YourModuleTag:D *:S
This shows only logs having a level higher or equal to DEBUG for
cr_YourModuleTag
, and SILENT (nothing is logged at this level or higher, so it
silences the tags) for everything else. You can persist a filter by setting an
environment variable:
export ANDROID_LOG_TAGS="cr_YourModuleTag:D *:S"
The syntax does not support tag expansion or regular expressions other than *
for all tags. Please use grep
or a similar tool to refine your filters
further.
For more, see the [related page on developer.android.com] (https://developer.android.com/tools/debugging/debugging-log.html#filteringOutput)
We use robolectric to run our JUnit tests. It
replaces some of the Android framework classes with "Shadow" classes
to ensure that we can run our code in a regular JVM. android.util.Log
is one
of those replaced classes, and by default calling Log
methods doesn't print
anything.
That default is not changed in the normal configuration, but if you need to enable logging locally or for a specific test, just add those few lines to your test:
@Before
public void setUp() {
ShadowLog.stream = System.out;
// Your other setup here
}