Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Switch to using "go.uber.org/zap" for structured logging. #820

Draft
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

fancycode
Copy link
Member

No description provided.

@@ -330,11 +332,15 @@
go c.processMessages()

addr := c.RemoteAddr()
log := c.log.With(
zap.String("addr", addr),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
@@ -448,11 +472,19 @@
return false
}

log := c.log.With(
zap.String("addr", c.RemoteAddr()),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
@@ -461,11 +493,18 @@
close:
c.conn.SetWriteDeadline(time.Now().Add(writeWait)) // nolint
if err := c.conn.WriteMessage(websocket.CloseMessage, closeData); err != nil {
log := c.log.With(
zap.String("addr", c.RemoteAddr()),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
@@ -536,11 +581,17 @@
msg := strconv.FormatInt(now, 10)
c.conn.SetWriteDeadline(time.Now().Add(writeWait)) // nolint
if err := c.conn.WriteMessage(websocket.PingMessage, []byte(msg)); err != nil {
log := c.log.With(
zap.String("addr", c.RemoteAddr()),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
@@ -856,7 +890,9 @@

client, ok := c.(*Client)
if !ok {
log.Printf("Can't register non-client %T", c)
h.log.Warn("Can't register non-client",
zap.Any("client", c),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
if err != nil {
log.Printf("Could not create client for %s: %s", addr, err)
log.Error("Could not create client",
zap.String("addr", addr),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
zap.Any("candidate", candidate),
zap.Any("streamtype", client.StreamType()),
zap.String("id", client.Id()),
zap.Any("client", client),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
s.log.Warn("Received ice completed event from unknown client",
zap.Any("streamtype", client.StreamType()),
zap.String("id", client.Id()),
zap.Any("client", client),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
log.Printf("Detected bruteforce attempt on \"%s\" from %s", action, client)
t.log.Info("Detected bruteforce attempt",
zap.String("action", action),
zap.String("client", client),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
log.Printf("Failed attempt on \"%s\" from %s, throttling by %s", action, client, delay)
t.log.Info("Failed attempt, throttling",
zap.String("action", action),
zap.String("client", client),

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.
@coveralls
Copy link

coveralls commented Sep 15, 2024

Pull Request Test Coverage Report for Build 10872977727

Details

  • 813 of 2998 (27.12%) changed or added relevant lines in 51 files are covered.
  • 191 unchanged lines in 37 files lost coverage.
  • Overall coverage decreased (-3.4%) to 55.045%

Changes Missing Coverage Covered Lines Changed/Added Lines %
natsclient_loopback.go 2 5 40.0%
dns_monitor.go 2 6 33.33%
roomsessions_builtin.go 8 12 66.67%
api_signaling.go 0 6 0.0%
certificate_reloader.go 16 22 72.73%
remotesession.go 5 12 41.67%
file_watcher.go 2 10 20.0%
room_ping.go 2 12 16.67%
natsclient.go 18 29 62.07%
proxy/proxy_tokens_static.go 14 25 56.0%
Files with Coverage Reduction New Missed Lines %
backend_client.go 1 58.48%
virtualsession.go 1 58.59%
proxy_config_etcd.go 1 63.95%
capabilities.go 1 74.71%
backend_storage_etcd.go 1 72.85%
file_watcher.go 1 78.35%
remotesession.go 1 72.63%
async_events_nats.go 1 82.11%
natsclient.go 1 61.29%
mcu_janus_subscriber.go 2 0.0%
Totals Coverage Status
Change from base Build 10735853359: -3.4%
Covered Lines: 11096
Relevant Lines: 20158

💛 - Coveralls

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants