Skip to content

Commit

Permalink
Provide TraceID in the logs
Browse files Browse the repository at this point in the history
Signed-off-by: Roman Zavodskikh <[email protected]>
  • Loading branch information
Roman Zavodskikh committed Apr 20, 2023
1 parent aa782b1 commit 9e4bb39
Show file tree
Hide file tree
Showing 27 changed files with 118 additions and 76 deletions.
5 changes: 2 additions & 3 deletions filters/auth/auth.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ import (
"net/http"
"strings"

log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
logfilter "github.com/zalando/skipper/filters/log"
)
Expand Down Expand Up @@ -107,12 +106,12 @@ func reject(
debuginfo string,
) {
if debuginfo == "" {
log.Debugf(
ctx.Logger().Debugf(
"Rejected: status: %d, username: %s, reason: %s.",
status, username, reason,
)
} else {
log.Debugf(
ctx.Logger().Debugf(
"Rejected: status: %d, username: %s, reason: %s, info: %s.",
status, username, reason, debuginfo,
)
Expand Down
5 changes: 2 additions & 3 deletions filters/auth/forwardtoken.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@ import (
"encoding/json"
"fmt"

log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
"golang.org/x/net/http/httpguts"
)
Expand Down Expand Up @@ -82,13 +81,13 @@ func (f *forwardTokenFilter) Request(ctx filters.FilterContext) {
case tokenIntrospectionInfo:
tiMap = retainKeys(typedTiMap, f.RetainJsonKeys)
default:
log.Errorf("Unexpected input type[%T] for `forwardToken` filter. Unable to apply mask", typedTiMap)
ctx.Logger().Errorf("Unexpected input type[%T] for `forwardToken` filter. Unable to apply mask", typedTiMap)
}
}

payload, err := json.Marshal(tiMap)
if err != nil {
log.Errorf("Error while marshaling token: %v.", err)
ctx.Logger().Errorf("Error while marshaling token: %v.", err)
return
}
request := ctx.Request()
Expand Down
3 changes: 1 addition & 2 deletions filters/auth/forwardtokenfield.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ package auth
import (
"fmt"

log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
"golang.org/x/net/http/httpguts"
)
Expand Down Expand Up @@ -71,7 +70,7 @@ func (f *forwardTokenFieldFilter) Request(ctx filters.FilterContext) {
}, ctx, payload)

if err != nil {
log.Error(err)
ctx.Logger().Errorf("%v", err)
return
}
}
Expand Down
11 changes: 5 additions & 6 deletions filters/auth/grant.go
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@ import (
"net/http"
"time"

log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
"golang.org/x/oauth2"
)
Expand Down Expand Up @@ -65,7 +64,7 @@ func loginRedirectWithOverride(ctx filters.FilterContext, config *OAuthConfig, o

authConfig, err := config.GetConfig(req)
if err != nil {
log.Debugf("Failed to obtain auth config: %v", err)
ctx.Logger().Debugf("Failed to obtain auth config: %v", err)
ctx.Serve(&http.Response{
StatusCode: http.StatusForbidden,
})
Expand All @@ -80,7 +79,7 @@ func loginRedirectWithOverride(ctx filters.FilterContext, config *OAuthConfig, o

state, err := config.flowState.createState(original)
if err != nil {
log.Errorf("Failed to create login redirect: %v", err)
ctx.Logger().Errorf("Failed to create login redirect: %v", err)
serverError(ctx)
return
}
Expand Down Expand Up @@ -198,15 +197,15 @@ func (f *grantFilter) Request(ctx filters.FilterContext) {
tokeninfo, err := f.config.TokeninfoClient.getTokeninfo(token.AccessToken, ctx)
if err != nil {
if err != errInvalidToken {
log.Errorf("Failed to call tokeninfo: %v.", err)
ctx.Logger().Errorf("Failed to call tokeninfo: %v.", err)
}
loginRedirect(ctx, f.config)
return
}

err = f.setupToken(token, tokeninfo, ctx)
if err != nil {
log.Errorf("Failed to create token container: %v.", err)
ctx.Logger().Errorf("Failed to create token container: %v.", err)
loginRedirect(ctx, f.config)
return
}
Expand All @@ -224,7 +223,7 @@ func (f *grantFilter) Response(ctx filters.FilterContext) {

c, err := createCookie(f.config, ctx.Request().Host, token)
if err != nil {
log.Errorf("Failed to generate cookie: %v.", err)
ctx.Logger().Errorf("Failed to generate cookie: %v.", err)
return
}

Expand Down
5 changes: 2 additions & 3 deletions filters/auth/grantcallback.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@ import (
"net/http"
"net/url"

log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
"golang.org/x/oauth2"
)
Expand Down Expand Up @@ -86,14 +85,14 @@ func (f *grantCallbackFilter) Request(ctx filters.FilterContext) {

token, err := f.exchangeAccessToken(req, code)
if err != nil {
log.Errorf("Failed to exchange access token: %v.", err)
ctx.Logger().Errorf("Failed to exchange access token: %v.", err)
serverError(ctx)
return
}

c, err := createCookie(f.config, req.Host, token)
if err != nil {
log.Errorf("Failed to create OAuth grant cookie: %v.", err)
ctx.Logger().Errorf("Failed to create OAuth grant cookie: %v.", err)
serverError(ctx)
return
}
Expand Down
5 changes: 2 additions & 3 deletions filters/auth/grantlogout.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ import (
"net/url"
"strings"

log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
"golang.org/x/oauth2"
)
Expand Down Expand Up @@ -157,14 +156,14 @@ func (f *grantLogoutFilter) Request(ctx filters.FilterContext) {
if c.AccessToken != "" {
accessTokenRevokeError = f.revokeTokenType(authConfig, accessTokenType, c.AccessToken)
if accessTokenRevokeError != nil {
log.Error(accessTokenRevokeError)
ctx.Logger().Errorf("%v", accessTokenRevokeError)
}
}

if c.RefreshToken != "" {
refreshTokenRevokeError = f.revokeTokenType(authConfig, refreshTokenType, c.RefreshToken)
if refreshTokenRevokeError != nil {
log.Error(refreshTokenRevokeError)
ctx.Logger().Errorf("%v", refreshTokenRevokeError)
}
}

Expand Down
2 changes: 1 addition & 1 deletion filters/auth/jwt_validation.go
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@ func (f *jwtValidationFilter) Request(ctx filters.FilterContext) {

claims, err := parseToken(token, f.jwksUri)
if err != nil {
log.Errorf("Error while parsing jwt token : %v.", err)
ctx.Logger().Errorf("Error while parsing jwt token : %v.", err)
unauthorized(ctx, "", invalidToken, "", "")
return
}
Expand Down
24 changes: 12 additions & 12 deletions filters/auth/oidc.go
Original file line number Diff line number Diff line change
Expand Up @@ -390,21 +390,21 @@ func (f *tokenOidcFilter) internalServerError(ctx filters.FilterContext) {
func (f *tokenOidcFilter) doOauthRedirect(ctx filters.FilterContext, cookies []*http.Cookie) {
nonce, err := f.encrypter.CreateNonce()
if err != nil {
log.Errorf("Failed to create nonce: %v.", err)
ctx.Logger().Errorf("Failed to create nonce: %v.", err)
f.internalServerError(ctx)
return
}

redirectUrl := ctx.Request().URL.String()
statePlain, err := createState(nonce, redirectUrl)
if err != nil {
log.Errorf("Failed to create oauth2 state: %v.", err)
ctx.Logger().Errorf("Failed to create oauth2 state: %v.", err)
f.internalServerError(ctx)
return
}
stateEnc, err := f.encrypter.Encrypt(statePlain)
if err != nil {
log.Errorf("Failed to encrypt data block: %v.", err)
ctx.Logger().Errorf("Failed to encrypt data block: %v.", err)
f.internalServerError(ctx)
return
}
Expand All @@ -431,7 +431,7 @@ func (f *tokenOidcFilter) doOauthRedirect(ctx filters.FilterContext, cookies []*
for _, cookie := range cookies {
rsp.Header.Add("Set-Cookie", cookie.String())
}
log.Debugf("serve redirect: plaintextState:%s to Location: %s", statePlain, rsp.Header.Get("Location"))
ctx.Logger().Debugf("serve redirect: plaintextState:%s to Location: %s", statePlain, rsp.Header.Get("Location"))
ctx.Serve(rsp)
}

Expand Down Expand Up @@ -520,7 +520,7 @@ func mergerCookies(cookies []*http.Cookie) *http.Cookie {
}

func (f *tokenOidcFilter) doDownstreamRedirect(ctx filters.FilterContext, oidcState []byte, maxAge time.Duration, redirectUrl string) {
log.Debugf("Doing Downstream Redirect to :%s", redirectUrl)
ctx.Logger().Debugf("Doing Downstream Redirect to :%s", redirectUrl)
r := &http.Response{
StatusCode: http.StatusTemporaryRedirect,
Header: http.Header{
Expand Down Expand Up @@ -582,7 +582,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
oauthState, err := f.getCallbackState(ctx)
if err != nil {
if _, ok := err.(*requestError); !ok {
log.Errorf("Error while retrieving callback state: %v.", err)
ctx.Logger().Errorf("Error while retrieving callback state: %v.", err)
}

unauthorized(
Expand All @@ -599,7 +599,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
oauth2Token, err = f.getTokenWithExchange(oauthState, ctx)
if err != nil {
if _, ok := err.(*requestError); !ok {
log.Errorf("Error while getting token in callback: %v.", err)
ctx.Logger().Errorf("Error while getting token in callback: %v.", err)
}

unauthorized(
Expand Down Expand Up @@ -634,7 +634,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
oidcIDToken, err = f.getidtoken(ctx, oauth2Token)
if err != nil {
if _, ok := err.(*requestError); !ok {
log.Errorf("Error while getting id token: %v", err)
ctx.Logger().Errorf("Error while getting id token: %v", err)
}

unauthorized(
Expand Down Expand Up @@ -663,7 +663,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
oidcIDToken, err = f.getidtoken(ctx, oauth2Token)
if err != nil {
if _, ok := err.(*requestError); !ok {
log.Errorf("Error while getting id token: %v", err)
ctx.Logger().Errorf("Error while getting id token: %v", err)
}

unauthorized(
Expand All @@ -679,7 +679,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
claimsMap, sub, err = f.tokenClaims(ctx, oauth2Token)
if err != nil {
if _, ok := err.(*requestError); !ok {
log.Errorf("Failed to get claims with error: %v", err)
ctx.Logger().Errorf("Failed to get claims with error: %v", err)
}

unauthorized(
Expand Down Expand Up @@ -825,7 +825,7 @@ func (f *tokenOidcFilter) Request(ctx filters.FilterContext) {
// adding upstream headers
err = setHeaders(f.upstreamHeaders, ctx, container)
if err != nil {
log.Error(err)
ctx.Logger().Errorf("%v", err)
f.internalServerError(ctx)
return
}
Expand Down Expand Up @@ -916,7 +916,7 @@ func (f *tokenOidcFilter) getCallbackState(ctx filters.FilterContext) (*OauthSta
return nil, requestErrorf("token from state query is invalid: %v", err)
}

log.Debugf("len(stateQueryPlain): %d, stateQueryEnc: %d, stateQueryEncHex: %d", len(stateQueryPlain), len(stateQueryEnc), len(stateQueryEncHex))
ctx.Logger().Debugf("len(stateQueryPlain): %d, stateQueryEnc: %d, stateQueryEncHex: %d", len(stateQueryPlain), len(stateQueryEnc), len(stateQueryEncHex))

state, err := extractState(stateQueryPlain)
if err != nil {
Expand Down
2 changes: 1 addition & 1 deletion filters/auth/oidc_introspection.go
Original file line number Diff line number Diff line change
Expand Up @@ -115,7 +115,7 @@ func (filter *oidcIntrospectionFilter) Request(ctx filters.FilterContext) {

token, ok := ctx.StateBag()[oidcClaimsCacheKey].(tokenContainer)
if !ok || &token == (&tokenContainer{}) || len(token.Claims) == 0 {
log.Errorf("Error retrieving %s for OIDC token introspection", oidcClaimsCacheKey)
ctx.Logger().Errorf("Error retrieving %s for OIDC token introspection", oidcClaimsCacheKey)
unauthorized(ctx, "", missingToken, r.Host, oidcClaimsCacheKey+" is unavailable in StateBag")
return
}
Expand Down
5 changes: 2 additions & 3 deletions filters/auth/tokeninfo.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ import (
"time"

"github.com/opentracing/opentracing-go"
log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
)

Expand Down Expand Up @@ -357,7 +356,7 @@ func (f *tokeninfoFilter) Request(ctx filters.FilterContext) {
if err == errInvalidToken {
reason = invalidToken
} else {
log.Errorf("Error while calling tokeninfo: %v.", err)
ctx.Logger().Errorf("Error while calling tokeninfo: %v", err)
}

unauthorized(ctx, "", reason, "", "")
Expand All @@ -380,7 +379,7 @@ func (f *tokeninfoFilter) Request(ctx filters.FilterContext) {
case checkOAuthTokeninfoAllKV:
allowed = f.validateAllKV(authMap)
default:
log.Errorf("Wrong tokeninfoFilter type: %s.", f)
ctx.Logger().Errorf("Wrong tokeninfoFilter type: %s.", f)
}

if !allowed {
Expand Down
7 changes: 3 additions & 4 deletions filters/auth/tokenintrospection.go
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,6 @@ import (
"time"

"github.com/opentracing/opentracing-go"
log "github.com/sirupsen/logrus"
"github.com/zalando/skipper/filters"
)

Expand Down Expand Up @@ -433,7 +432,7 @@ func (f *tokenintrospectFilter) Request(ctx filters.FilterContext) {
if err == errInvalidToken {
reason = invalidToken
} else {
log.Errorf("Error while calling token introspection: %v.", err)
ctx.Logger().Errorf("Error while calling token introspection: %v", err)
}

unauthorized(ctx, "", reason, f.authClient.url.Hostname(), "")
Expand All @@ -446,7 +445,7 @@ func (f *tokenintrospectFilter) Request(ctx filters.FilterContext) {
sub, err := info.Sub()
if err != nil {
if err != errInvalidTokenintrospectionData {
log.Errorf("Error while reading token: %v.", err)
ctx.Logger().Errorf("Error while reading token: %v", err)
}

unauthorized(ctx, sub, invalidSub, f.authClient.url.Hostname(), "")
Expand All @@ -469,7 +468,7 @@ func (f *tokenintrospectFilter) Request(ctx filters.FilterContext) {
case checkOAuthTokenintrospectionAllKV, checkSecureOAuthTokenintrospectionAllKV:
allowed = f.validateAllKV(info)
default:
log.Errorf("Wrong tokenintrospectionFilter type: %s.", f)
ctx.Logger().Errorf("Wrong tokenintrospectionFilter type: %s", f)
}

if !allowed {
Expand Down
3 changes: 1 addition & 2 deletions filters/auth/webhook.go
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@ import (
"time"

"github.com/opentracing/opentracing-go"
log "github.com/sirupsen/logrus"
"golang.org/x/net/http/httpguts"

"github.com/zalando/skipper/filters"
Expand Down Expand Up @@ -113,7 +112,7 @@ func copyHeader(to, from http.Header) {
func (f *webhookFilter) Request(ctx filters.FilterContext) {
resp, err := f.authClient.getWebhook(ctx)
if err != nil {
log.Errorf("Failed to make authentication webhook request: %v.", err)
ctx.Logger().Errorf("Failed to make authentication webhook request: %v.", err)
}

// forbidden
Expand Down
6 changes: 3 additions & 3 deletions filters/builtin/decompress.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,14 +4,14 @@ import (
"compress/flate"
"compress/gzip"
"fmt"
"github.com/andybalholm/brotli"
"io"
"net/http"
"runtime"
"strings"
"sync"

log "github.com/sirupsen/logrus"
"github.com/andybalholm/brotli"

"github.com/zalando/skipper/filters"
)

Expand Down Expand Up @@ -235,7 +235,7 @@ func (d decompress) Response(ctx filters.FilterContext) {
sb[DecompressionNotPossible] = true
sb[DecompressionError] = err

log.Errorf("Error while initializing decompression: %v", err)
ctx.Logger().Errorf("Error while initializing decompression: %v", err)
return
}

Expand Down
Loading

0 comments on commit 9e4bb39

Please sign in to comment.