Standardizing log messages to colons
This commit is contained in:
		
							parent
							
								
									8a17ef8d71
								
							
						
					
					
						commit
						9eaa9fdcbf
					
				|  | @ -758,7 +758,7 @@ func (p *OAuthProxy) OAuthCallback(rw http.ResponseWriter, req *http.Request) { | |||
| 
 | ||||
| 	s := strings.SplitN(req.Form.Get("state"), ":", 2) | ||||
| 	if len(s) != 2 { | ||||
| 		logger.Printf("Error while parsing OAuth2 state; invalid length") | ||||
| 		logger.Printf("Error while parsing OAuth2 state: invalid length") | ||||
| 		p.ErrorPage(rw, 500, "Internal Error", "Invalid State") | ||||
| 		return | ||||
| 	} | ||||
|  | @ -766,13 +766,13 @@ func (p *OAuthProxy) OAuthCallback(rw http.ResponseWriter, req *http.Request) { | |||
| 	redirect := s[1] | ||||
| 	c, err := req.Cookie(p.CSRFCookieName) | ||||
| 	if err != nil { | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthFailure, "Invalid authentication via OAuth2; unable too obtain CSRF cookie") | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthFailure, "Invalid authentication via OAuth2: unable too obtain CSRF cookie") | ||||
| 		p.ErrorPage(rw, 403, "Permission Denied", err.Error()) | ||||
| 		return | ||||
| 	} | ||||
| 	p.ClearCSRFCookie(rw, req) | ||||
| 	if c.Value != nonce { | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthFailure, "Invalid authentication via OAuth2; csrf token mismatch, potential attack") | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthFailure, "Invalid authentication via OAuth2: csrf token mismatch, potential attack") | ||||
| 		p.ErrorPage(rw, 403, "Permission Denied", "csrf failed") | ||||
| 		return | ||||
| 	} | ||||
|  | @ -783,7 +783,7 @@ func (p *OAuthProxy) OAuthCallback(rw http.ResponseWriter, req *http.Request) { | |||
| 
 | ||||
| 	// set cookie, or deny
 | ||||
| 	if p.Validator(session.Email) && p.provider.ValidateGroup(session.Email) { | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthSuccess, "Authenticated via OAuth2; %s", session) | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthSuccess, "Authenticated via OAuth2: %s", session) | ||||
| 		err := p.SaveSession(rw, req, session) | ||||
| 		if err != nil { | ||||
| 			logger.Printf("%s %s", remoteAddr, err) | ||||
|  | @ -792,7 +792,7 @@ func (p *OAuthProxy) OAuthCallback(rw http.ResponseWriter, req *http.Request) { | |||
| 		} | ||||
| 		http.Redirect(rw, req, redirect, 302) | ||||
| 	} else { | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthSuccess, "Invalid authentication via OAuth2; unauthorized") | ||||
| 		logger.PrintAuthf(session.Email, req, logger.AuthSuccess, "Invalid authentication via OAuth2: unauthorized") | ||||
| 		p.ErrorPage(rw, 403, "Permission Denied", "Invalid Account") | ||||
| 	} | ||||
| } | ||||
|  | @ -852,7 +852,7 @@ func (p *OAuthProxy) Authenticate(rw http.ResponseWriter, req *http.Request) int | |||
| 	} | ||||
| 
 | ||||
| 	if session != nil && session.IsExpired() { | ||||
| 		logger.Printf("Removing session; token expired %s", session) | ||||
| 		logger.Printf("Removing session: token expired %s", session) | ||||
| 		session = nil | ||||
| 		saveSession = false | ||||
| 		clearSession = true | ||||
|  | @ -860,7 +860,7 @@ func (p *OAuthProxy) Authenticate(rw http.ResponseWriter, req *http.Request) int | |||
| 
 | ||||
| 	if saveSession && !revalidated && session != nil && session.AccessToken != "" { | ||||
| 		if !p.provider.ValidateSessionState(session) { | ||||
| 			logger.Printf("Removing session; error validating %s", session) | ||||
| 			logger.Printf("Removing session: error validating %s", session) | ||||
| 			saveSession = false | ||||
| 			session = nil | ||||
| 			clearSession = true | ||||
|  | @ -868,7 +868,7 @@ func (p *OAuthProxy) Authenticate(rw http.ResponseWriter, req *http.Request) int | |||
| 	} | ||||
| 
 | ||||
| 	if session != nil && session.Email != "" && !p.Validator(session.Email) { | ||||
| 		logger.Printf(session.Email, req, logger.AuthFailure, "Invalid authentication via session; removing session %s", session) | ||||
| 		logger.Printf(session.Email, req, logger.AuthFailure, "Invalid authentication via session: removing session %s", session) | ||||
| 		session = nil | ||||
| 		saveSession = false | ||||
| 		clearSession = true | ||||
|  | @ -968,7 +968,7 @@ func (p *OAuthProxy) CheckBasicAuth(req *http.Request) (*providers.SessionState, | |||
| 		logger.PrintAuthf(pair[0], req, logger.AuthSuccess, "Authenticated via basic auth and HTpasswd File") | ||||
| 		return &providers.SessionState{User: pair[0]}, nil | ||||
| 	} | ||||
| 	logger.PrintAuthf(pair[0], req, logger.AuthFailure, "Invalid authentication via basic auth; not in Htpasswd File") | ||||
| 	logger.PrintAuthf(pair[0], req, logger.AuthFailure, "Invalid authentication via basic auth: not in Htpasswd File") | ||||
| 	return nil, nil | ||||
| } | ||||
| 
 | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue