Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Clean up logging #3161

Merged
merged 3 commits into from
Jan 10, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions agent/rpc/client_grpc.go
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ func (c *client) Next(ctx context.Context, f rpc.Filter) (*rpc.Workflow, error)
// https://github.com/woodpecker-ci/woodpecker/issues/717#issuecomment-1049365104
log.Trace().Err(err).Msg("grpc: to many keepalive pings without sending data")
} else {
log.Err(err).Msgf("grpc error: done(): code: %v: %s", status.Code(err), err)
log.Error().Err(err).Msgf("grpc error: done(): code: %v", status.Code(err))
}

switch status.Code(err) {
Expand Down Expand Up @@ -136,7 +136,7 @@ func (c *client) Wait(ctx context.Context, id string) (err error) {
break
}

log.Err(err).Msgf("grpc error: wait(): code: %v: %s", status.Code(err), err)
log.Error().Err(err).Msgf("grpc error: wait(): code: %v", status.Code(err))

switch status.Code(err) {
case
Expand Down Expand Up @@ -177,7 +177,7 @@ func (c *client) Init(ctx context.Context, id string, state rpc.State) (err erro
break
}

log.Err(err).Msgf("grpc error: init(): code: %v: %s", status.Code(err), err)
log.Error().Err(err).Msgf("grpc error: init(): code: %v", status.Code(err))

switch status.Code(err) {
case
Expand Down Expand Up @@ -218,7 +218,7 @@ func (c *client) Done(ctx context.Context, id string, state rpc.State) (err erro
break
}

log.Err(err).Msgf("grpc error: done(): code: %v: %s", status.Code(err), err)
log.Error().Err(err).Msgf("grpc error: done(): code: %v", status.Code(err))

switch status.Code(err) {
case
Expand Down Expand Up @@ -252,7 +252,7 @@ func (c *client) Extend(ctx context.Context, id string) (err error) {
break
}

log.Err(err).Msgf("grpc error: extend(): code: %v: %s", status.Code(err), err)
log.Error().Err(err).Msgf("grpc error: extend(): code: %v", status.Code(err))

switch status.Code(err) {
case
Expand Down Expand Up @@ -293,7 +293,7 @@ func (c *client) Update(ctx context.Context, id string, state rpc.State) (err er
break
}

log.Err(err).Msgf("grpc error: update(): code: %v: %s", status.Code(err), err)
log.Error().Err(err).Msgf("grpc error: update(): code: %v", status.Code(err))

switch status.Code(err) {
case
Expand Down Expand Up @@ -332,7 +332,7 @@ func (c *client) Log(ctx context.Context, logEntry *rpc.LogEntry) (err error) {
break
}

log.Err(err).Msgf("grpc error: log(): code: %v: %s", status.Code(err), err)
log.Error().Err(err).Msgf("grpc error: log(): code: %v", status.Code(err))

switch status.Code(err) {
case
Expand Down
6 changes: 3 additions & 3 deletions cli/internal/util.go
Original file line number Diff line number Diff line change
Expand Up @@ -44,16 +44,16 @@
// if no server url is provided we can default
// to the hosted Woodpecker service.
if len(server) == 0 {
return nil, fmt.Errorf("Error: you must provide the Woodpecker server address")
return nil, fmt.Errorf("you must provide the Woodpecker server address")

Check warning on line 47 in cli/internal/util.go

View check run for this annotation

Codecov / codecov/patch

cli/internal/util.go#L47

Added line #L47 was not covered by tests
}
if len(token) == 0 {
return nil, fmt.Errorf("Error: you must provide your Woodpecker access token")
return nil, fmt.Errorf("you must provide your Woodpecker access token")

Check warning on line 50 in cli/internal/util.go

View check run for this annotation

Codecov / codecov/patch

cli/internal/util.go#L50

Added line #L50 was not covered by tests
}

// attempt to find system CA certs
certs, err := x509.SystemCertPool()
if err != nil {
log.Error().Msgf("failed to find system CA certs: %v", err)
log.Error().Err(err).Msg("failed to find system CA certs")

Check warning on line 56 in cli/internal/util.go

View check run for this annotation

Codecov / codecov/patch

cli/internal/util.go#L56

Added line #L56 was not covered by tests
}
tlsConfig := &tls.Config{
RootCAs: certs,
Expand Down
4 changes: 2 additions & 2 deletions cmd/agent/agent.go
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@
if c.Bool("healthcheck") {
go func() {
if err := http.ListenAndServe(c.String("healthcheck-addr"), nil); err != nil {
log.Error().Msgf("cannot listen on address %s: %v", c.String("healthcheck-addr"), err)
log.Error().Err(err).Msgf("cannot listen on address %s", c.String("healthcheck-addr"))

Check warning on line 65 in cmd/agent/agent.go

View check run for this annotation

Codecov / codecov/patch

cmd/agent/agent.go#L65

Added line #L65 was not covered by tests
}
}()
}
Expand Down Expand Up @@ -210,7 +210,7 @@

err := client.ReportHealth(ctx)
if err != nil {
log.Err(err).Msgf("Failed to report health")
log.Err(err).Msg("Failed to report health")

Check warning on line 213 in cmd/agent/agent.go

View check run for this annotation

Codecov / codecov/patch

cmd/agent/agent.go#L213

Added line #L213 was not covered by tests
return
}

Expand Down Expand Up @@ -269,9 +269,9 @@
}

func runWithRetry(context *cli.Context) error {
if err := logger.SetupGlobalLogger(context, true); err != nil {
return err
}

Check warning on line 274 in cmd/agent/agent.go

View check run for this annotation

Codecov / codecov/patch

cmd/agent/agent.go#L272-L274

Added lines #L272 - L274 were not covered by tests

initHealth()

Expand Down
4 changes: 2 additions & 2 deletions cmd/server/setup.go
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@
addonTypes "go.woodpecker-ci.org/woodpecker/v2/shared/addon/types"
)

func setupStore(c *cli.Context) (store.Store, error) {

Check warning on line 57 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L57

Added line #L57 was not covered by tests
datasource := c.String("datasource")
driver := c.String("driver")
xorm := store.XORM{
Expand All @@ -64,19 +64,19 @@

if driver == "sqlite3" {
if datastore.SupportedDriver("sqlite3") {
log.Debug().Msgf("server has sqlite3 support")
log.Debug().Msg("server has sqlite3 support")

Check warning on line 67 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L67

Added line #L67 was not covered by tests
} else {
log.Debug().Msgf("server was built without sqlite3 support!")
log.Debug().Msg("server was built without sqlite3 support!")

Check warning on line 69 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L69

Added line #L69 was not covered by tests
}
}

if !datastore.SupportedDriver(driver) {
return nil, fmt.Errorf("database driver '%s' not supported", driver)

Check warning on line 74 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L74

Added line #L74 was not covered by tests
}

if driver == "sqlite3" {
if err := checkSqliteFileExist(datasource); err != nil {
return nil, fmt.Errorf("check sqlite file: %w", err)

Check warning on line 79 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L79

Added line #L79 was not covered by tests
}
}

Expand All @@ -88,14 +88,14 @@
log.Trace().Msgf("setup datastore: %#v", *opts)
store, err := datastore.NewEngine(opts)
if err != nil {
return nil, fmt.Errorf("could not open datastore: %w", err)

Check warning on line 91 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L91

Added line #L91 was not covered by tests
}

if err := store.Migrate(c.Bool("migrations-allow-long")); err != nil {
return nil, fmt.Errorf("could not migrate datastore: %w", err)

Check warning on line 95 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L95

Added line #L95 was not covered by tests
}

return store, nil

Check warning on line 98 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L98

Added line #L98 was not covered by tests
}

func checkSqliteFileExist(path string) error {
Expand Down Expand Up @@ -204,7 +204,7 @@
SkipVerify: c.Bool("gitea-skip-verify"),
}
if len(opts.URL) == 0 {
return nil, fmt.Errorf("WOODPECKER_GITEA_URL must be set")

Check warning on line 207 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L207

Added line #L207 was not covered by tests
}
log.Trace().Msgf("Forge (gitea) opts: %#v", opts)
return gitea.New(opts)
Expand Down Expand Up @@ -294,30 +294,30 @@
}

// setupSignatureKeys generate or load key pair to sign webhooks requests (i.e. used for extensions)
func setupSignatureKeys(_store store.Store) (crypto.PrivateKey, crypto.PublicKey, error) {

Check warning on line 297 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L297

Added line #L297 was not covered by tests
privKeyID := "signature-private-key"

privKey, err := _store.ServerConfigGet(privKeyID)
if errors.Is(err, types.RecordNotExist) {
_, privKey, err := ed25519.GenerateKey(rand.Reader)
if err != nil {
return nil, nil, fmt.Errorf("failed to generate private key: %w", err)

Check warning on line 304 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L304

Added line #L304 was not covered by tests
}
err = _store.ServerConfigSet(privKeyID, hex.EncodeToString(privKey))
if err != nil {
return nil, nil, fmt.Errorf("failed to store private key: %w", err)

Check warning on line 308 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L308

Added line #L308 was not covered by tests
}
log.Debug().Msg("Created private key")
return privKey, privKey.Public(), nil

Check warning on line 311 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L311

Added line #L311 was not covered by tests
} else if err != nil {
return nil, nil, fmt.Errorf("failed to load private key: %w", err)

Check warning on line 313 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L313

Added line #L313 was not covered by tests
}
privKeyStr, err := hex.DecodeString(privKey)
if err != nil {
return nil, nil, fmt.Errorf("failed to decode private key: %w", err)

Check warning on line 317 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L317

Added line #L317 was not covered by tests
}
privateKey := ed25519.PrivateKey(privKeyStr)
return privateKey, privateKey.Public(), nil

Check warning on line 320 in cmd/server/setup.go

View check run for this annotation

Codecov / codecov/patch

cmd/server/setup.go#L320

Added line #L320 was not covered by tests
}

func setupConfigService(c *cli.Context) (config.Extension, error) {
Expand Down
4 changes: 2 additions & 2 deletions pipeline/backend/kubernetes/kubernetes.go
Original file line number Diff line number Diff line change
Expand Up @@ -99,13 +99,13 @@
// Unmarshal label and annotation settings here to ensure they're valid on startup
if labels := c.String("backend-k8s-pod-labels"); labels != "" {
if err := yaml.Unmarshal([]byte(labels), &config.PodLabels); err != nil {
log.Error().Msgf("could not unmarshal pod labels '%s': %s", c.String("backend-k8s-pod-labels"), err)
log.Error().Err(err).Msgf("could not unmarshal pod labels '%s'", c.String("backend-k8s-pod-labels"))

Check warning on line 102 in pipeline/backend/kubernetes/kubernetes.go

View check run for this annotation

Codecov / codecov/patch

pipeline/backend/kubernetes/kubernetes.go#L102

Added line #L102 was not covered by tests
return nil, err
}
}
if annotations := c.String("backend-k8s-pod-annotations"); annotations != "" {
if err := yaml.Unmarshal([]byte(c.String("backend-k8s-pod-annotations")), &config.PodAnnotations); err != nil {
log.Error().Msgf("could not unmarshal pod annotations '%s': %s", c.String("backend-k8s-pod-annotations"), err)
log.Error().Err(err).Msgf("could not unmarshal pod annotations '%s'", c.String("backend-k8s-pod-annotations"))

Check warning on line 108 in pipeline/backend/kubernetes/kubernetes.go

View check run for this annotation

Codecov / codecov/patch

pipeline/backend/kubernetes/kubernetes.go#L108

Added line #L108 was not covered by tests
return nil, err
}
}
Expand Down
2 changes: 1 addition & 1 deletion pipeline/backend/kubernetes/pod.go
Original file line number Diff line number Diff line change
Expand Up @@ -258,7 +258,7 @@
resName := v1.ResourceName(key)
resVal, err := resource.ParseQuantity(val)
if err != nil {
return nil, fmt.Errorf("resource request '%v' quantity '%v': %w", key, val, err)
return nil, fmt.Errorf("resource request '%s' quantity '%s': %w", key, val, err)

Check warning on line 261 in pipeline/backend/kubernetes/pod.go

View check run for this annotation

Codecov / codecov/patch

pipeline/backend/kubernetes/pod.go#L261

Added line #L261 was not covered by tests
}
requestResources[resName] = resVal
}
Expand Down
2 changes: 1 addition & 1 deletion pipeline/backend/local/local.go
Original file line number Diff line number Diff line change
Expand Up @@ -235,7 +235,7 @@

// DestroyWorkflow the pipeline environment.
func (e *local) DestroyWorkflow(_ context.Context, _ *types.Config, taskUUID string) error {
log.Trace().Str("taskUUID", taskUUID).Msgf("delete workflow environment")
log.Trace().Str("taskUUID", taskUUID).Msg("delete workflow environment")

Check warning on line 238 in pipeline/backend/local/local.go

View check run for this annotation

Codecov / codecov/patch

pipeline/backend/local/local.go#L238

Added line #L238 was not covered by tests

state, err := e.getState(taskUUID)
if err != nil {
Expand Down
16 changes: 8 additions & 8 deletions server/api/login.go
Original file line number Diff line number Diff line change
Expand Up @@ -44,17 +44,17 @@
_store := store.FromContext(c)
_forge := server.Config.Services.Forge

// when dealing with redirects we may need to adjust the content type. I
// when dealing with redirects, we may need to adjust the content type. I

Check warning on line 47 in server/api/login.go

View check run for this annotation

Codecov / codecov/patch

server/api/login.go#L47

Added line #L47 was not covered by tests
// cannot, however, remember why, so need to revisit this line.
c.Writer.Header().Del("Content-Type")

tmpuser, err := _forge.Login(c, c.Writer, c.Request)
if err != nil {
log.Error().Msgf("cannot authenticate user. %s", err)
log.Error().Err(err).Msg("cannot authenticate user")

Check warning on line 53 in server/api/login.go

View check run for this annotation

Codecov / codecov/patch

server/api/login.go#L53

Added line #L53 was not covered by tests
c.Redirect(http.StatusSeeOther, server.Config.Server.RootPath+"/login?error=oauth_error")
return
}
// this will happen when the user is redirected by the forge as
// this will happen when the forge redirects the user as
// part of the authorization workflow.
if tmpuser == nil {
return
Expand Down Expand Up @@ -101,7 +101,7 @@

// insert the user into the database
if err := _store.CreateUser(u); err != nil {
log.Error().Msgf("cannot insert %s. %s", u.Login, err)
log.Error().Err(err).Msgf("cannot insert %s", u.Login)

Check warning on line 104 in server/api/login.go

View check run for this annotation

Codecov / codecov/patch

server/api/login.go#L104

Added line #L104 was not covered by tests
c.Redirect(http.StatusSeeOther, server.Config.Server.RootPath+"/login?error=internal_error")
return
}
Expand Down Expand Up @@ -137,15 +137,15 @@
}

if err := _store.UpdateUser(u); err != nil {
log.Error().Msgf("cannot update %s. %s", u.Login, err)
log.Error().Err(err).Msgf("cannot update %s", u.Login)

Check warning on line 140 in server/api/login.go

View check run for this annotation

Codecov / codecov/patch

server/api/login.go#L140

Added line #L140 was not covered by tests
c.Redirect(http.StatusSeeOther, server.Config.Server.RootPath+"/login?error=internal_error")
return
}

exp := time.Now().Add(server.Config.Server.SessionExpires).Unix()
tokenString, err := token.New(token.SessToken, u.Login).SignExpires(u.Hash, exp)
if err != nil {
log.Error().Msgf("cannot create token for %s. %s", u.Login, err)
log.Error().Msgf("cannot create token for %s", u.Login)

Check warning on line 148 in server/api/login.go

View check run for this annotation

Codecov / codecov/patch

server/api/login.go#L148

Added line #L148 was not covered by tests
c.Redirect(http.StatusSeeOther, server.Config.Server.RootPath+"/login?error=internal_error")
return
}
Expand All @@ -157,7 +157,7 @@
continue
}
if err != nil {
log.Error().Msgf("cannot list repos for %s. %s", u.Login, err)
log.Error().Err(err).Msgf("cannot list repos for %s", u.Login)

Check warning on line 160 in server/api/login.go

View check run for this annotation

Codecov / codecov/patch

server/api/login.go#L160

Added line #L160 was not covered by tests
c.Redirect(http.StatusSeeOther, "/login?error=internal_error")
return
}
Expand All @@ -173,7 +173,7 @@
perm.UserID = u.ID
perm.Synced = time.Now().Unix()
if err := _store.PermUpsert(perm); err != nil {
log.Error().Msgf("cannot update permissions for %s. %s", u.Login, err)
log.Error().Err(err).Msgf("cannot update permissions for %s", u.Login)

Check warning on line 176 in server/api/login.go

View check run for this annotation

Codecov / codecov/patch

server/api/login.go#L176

Added line #L176 was not covered by tests
c.Redirect(http.StatusSeeOther, "/login?error=internal_error")
return
}
Expand Down
2 changes: 1 addition & 1 deletion server/api/org.go
Original file line number Diff line number Diff line change
Expand Up @@ -140,7 +140,7 @@
} else if !user.Admin {
perm, err := server.Config.Services.Membership.Get(c, user, org.Name)
if err != nil {
log.Error().Msgf("Failed to check membership: %v", err)
log.Error().Err(err).Msg("Failed to check membership")

Check warning on line 143 in server/api/org.go

View check run for this annotation

Codecov / codecov/patch

server/api/org.go#L143

Added line #L143 was not covered by tests
c.Status(http.StatusInternalServerError)
return
}
Expand Down
2 changes: 1 addition & 1 deletion server/api/repo.go
Original file line number Diff line number Diff line change
Expand Up @@ -576,7 +576,7 @@
if !skipOnErr {
c.AbortWithStatus(http.StatusNotFound)
}
log.Error().Err(err).Msgf("could not get user on repo repair")
log.Error().Err(err).Msg("could not get user on repo repair")

Check warning on line 579 in server/api/repo.go

View check run for this annotation

Codecov / codecov/patch

server/api/repo.go#L579

Added line #L579 was not covered by tests
} else {
_ = c.AbortWithError(http.StatusInternalServerError, err)
}
Expand Down
8 changes: 4 additions & 4 deletions server/api/stream.go
Original file line number Diff line number Diff line change
Expand Up @@ -160,7 +160,7 @@
}
pl, err := _store.GetPipelineNumber(repo, pipeline)
if err != nil {
log.Debug().Msgf("stream cannot get pipeline number: %v", err)
log.Debug().Err(err).Msg("stream cannot get pipeline number")

Check warning on line 163 in server/api/stream.go

View check run for this annotation

Codecov / codecov/patch

server/api/stream.go#L163

Added line #L163 was not covered by tests
logWriteStringErr(io.WriteString(rw, "event: error\ndata: pipeline not found\n\n"))
return
}
Expand All @@ -173,7 +173,7 @@
}
step, err := _store.StepLoad(stepID)
if err != nil {
log.Debug().Msgf("stream cannot get step number: %v", err)
log.Debug().Err(err).Msg("stream cannot get step number")

Check warning on line 176 in server/api/stream.go

View check run for this annotation

Codecov / codecov/patch

server/api/stream.go#L176

Added line #L176 was not covered by tests
logWriteStringErr(io.WriteString(rw, "event: error\ndata: process not found\n\n"))
return
}
Expand All @@ -197,12 +197,12 @@
context.Background(),
)

log.Debug().Msgf("log stream: connection opened")
log.Debug().Msg("log stream: connection opened")

Check warning on line 200 in server/api/stream.go

View check run for this annotation

Codecov / codecov/patch

server/api/stream.go#L200

Added line #L200 was not covered by tests

defer func() {
cancel(nil)
close(logc)
log.Debug().Msgf("log stream: connection closed")
log.Debug().Msg("log stream: connection closed")

Check warning on line 205 in server/api/stream.go

View check run for this annotation

Codecov / codecov/patch

server/api/stream.go#L205

Added line #L205 was not covered by tests
}()

go func() {
Expand Down
2 changes: 1 addition & 1 deletion server/grpc/auth_server.go
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@
agent.Capacity = -1
err := s.store.AgentCreate(agent)
if err != nil {
log.Err(err).Msgf("Error creating system agent: %s", err)
log.Error().Err(err).Msg("Error creating system agent")

Check warning on line 72 in server/grpc/auth_server.go

View check run for this annotation

Codecov / codecov/patch

server/grpc/auth_server.go#L72

Added line #L72 was not covered by tests
return nil, err
}
return agent, nil
Expand Down
2 changes: 1 addition & 1 deletion server/grpc/rpc.go
Original file line number Diff line number Diff line change
Expand Up @@ -212,7 +212,7 @@
Pipeline: *currentPipeline,
})
if err != nil {
log.Error().Err(err).Msgf("could not marshal JSON")
log.Error().Err(err).Msg("could not marshal JSON")

Check warning on line 215 in server/grpc/rpc.go

View check run for this annotation

Codecov / codecov/patch

server/grpc/rpc.go#L215

Added line #L215 was not covered by tests
return
}
s.pubsub.Publish(message)
Expand Down
5 changes: 2 additions & 3 deletions server/pipeline/restart.go
Original file line number Diff line number Diff line change
Expand Up @@ -41,9 +41,8 @@
// fetch the old pipeline config from the database
configs, err := store.ConfigsForPipeline(lastPipeline.ID)
if err != nil {
msg := fmt.Sprintf("failure to get pipeline config for %s. %s", repo.FullName, err)
log.Error().Msgf(msg)
return nil, &ErrNotFound{Msg: msg}
log.Error().Err(err).Msgf("failure to get pipeline config for %s", repo.FullName)
return nil, &ErrNotFound{Msg: fmt.Sprintf("failure to get pipeline config for %s. %s", repo.FullName, err)}

Check warning on line 45 in server/pipeline/restart.go

View check run for this annotation

Codecov / codecov/patch

server/pipeline/restart.go#L44-L45

Added lines #L44 - L45 were not covered by tests
}

for _, y := range configs {
Expand Down
2 changes: 1 addition & 1 deletion server/plugins/encryption/tink_keyset.go
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@
defer func(file *os.File) {
err = file.Close()
if err != nil {
log.Err(err).Msgf(logTemplateTinkFailedClosingKeysetFile, svc.keysetFilePath)
log.Error().Err(err).Msgf(logTemplateTinkFailedClosingKeysetFile, svc.keysetFilePath)

Check warning on line 40 in server/plugins/encryption/tink_keyset.go

View check run for this annotation

Codecov / codecov/patch

server/plugins/encryption/tink_keyset.go#L40

Added line #L40 was not covered by tests
}
}(file)

Expand Down
4 changes: 2 additions & 2 deletions server/plugins/encryption/tink_keyset_watcher.go
Original file line number Diff line number Diff line change
Expand Up @@ -42,19 +42,19 @@
select {
case event, ok := <-svc.keysetFileWatcher.Events:
if !ok {
log.Fatal().Msg(errMessageTinkKeysetFileWatchFailed) //nolint:forbidigo

Check warning on line 45 in server/plugins/encryption/tink_keyset_watcher.go

View check run for this annotation

Codecov / codecov/patch

server/plugins/encryption/tink_keyset_watcher.go#L45

Added line #L45 was not covered by tests
}
if (event.Op == fsnotify.Write) || (event.Op == fsnotify.Create) {
log.Warn().Msgf(logTemplateTinkKeysetFileChanged, event.Name)
err := svc.rotate()
if err != nil {
log.Fatal().Err(err).Msgf(errMessageFailedRotatingEncryption) //nolint:forbidigo
log.Fatal().Err(err).Msg(errMessageFailedRotatingEncryption) //nolint:forbidigo

Check warning on line 51 in server/plugins/encryption/tink_keyset_watcher.go

View check run for this annotation

Codecov / codecov/patch

server/plugins/encryption/tink_keyset_watcher.go#L51

Added line #L51 was not covered by tests
}
return
}
case err, ok := <-svc.keysetFileWatcher.Errors:
if !ok {
log.Fatal().Err(err).Msgf(errMessageTinkKeysetFileWatchFailed) //nolint:forbidigo
log.Fatal().Err(err).Msg(errMessageTinkKeysetFileWatchFailed) //nolint:forbidigo

Check warning on line 57 in server/plugins/encryption/tink_keyset_watcher.go

View check run for this annotation

Codecov / codecov/patch

server/plugins/encryption/tink_keyset_watcher.go#L57

Added line #L57 was not covered by tests
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion server/queue/persistent.go
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@
if task != nil {
log.Debug().Msgf("pull queue item: %s: remove from backup", task.ID)
if derr := q.store.TaskDelete(task.ID); derr != nil {
log.Error().Msgf("pull queue item: %s: failed to remove from backup: %s", task.ID, derr)
log.Error().Err(derr).Msgf("pull queue item: %s: failed to remove from backup", task.ID)

Check warning on line 81 in server/queue/persistent.go

View check run for this annotation

Codecov / codecov/patch

server/queue/persistent.go#L81

Added line #L81 was not covered by tests
} else {
log.Debug().Msgf("pull queue item: %s: successfully removed from backup", task.ID)
}
Expand Down
7 changes: 4 additions & 3 deletions server/router/middleware/session/repo.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ import (

"github.com/gin-gonic/gin"
"github.com/rs/zerolog/log"

"go.woodpecker-ci.org/woodpecker/v2/server"

"go.woodpecker-ci.org/woodpecker/v2/server/model"
Expand Down Expand Up @@ -73,7 +74,7 @@ func SetRepo() gin.HandlerFunc {
}

// debugging
log.Debug().Err(err).Msgf("Cannot find repository %s.", fullName)
log.Debug().Err(err).Msgf("Cannot find repository %s", fullName)

if user == nil {
c.AbortWithStatus(http.StatusUnauthorized)
Expand Down Expand Up @@ -112,8 +113,8 @@ func SetPerm() gin.HandlerFunc {
var err error
perm, err = _store.PermFind(user, repo)
if err != nil {
log.Error().Msgf("Error fetching permission for %s %s. %s",
user.Login, repo.FullName, err)
log.Error().Err(err).Msgf("Error fetching permission for %s %s",
user.Login, repo.FullName)
}
if time.Unix(perm.Synced, 0).Add(time.Hour).Before(time.Now()) {
_repo, err := server.Config.Services.Forge.Repo(c, user, repo.ForgeRemoteID, repo.Owner, repo.Name)
Expand Down
2 changes: 1 addition & 1 deletion server/router/middleware/session/user.go
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ func MustOrgMember(admin bool) gin.HandlerFunc {

perm, err := server.Config.Services.Membership.Get(c, user, org.Name)
if err != nil {
log.Error().Msgf("Failed to check membership: %v", err)
log.Error().Err(err).Msg("Failed to check membership")
c.String(http.StatusInternalServerError, http.StatusText(http.StatusInternalServerError))
c.Abort()
return
Expand Down
4 changes: 2 additions & 2 deletions server/web/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@
"json": func(v any) string {
a, err := json.Marshal(v)
if err != nil {
log.Error().Err(err).Msgf("could not marshal JSON")
log.Error().Err(err).Msg("could not marshal JSON")

Check warning on line 57 in server/web/config.go

View check run for this annotation

Codecov / codecov/patch

server/web/config.go#L57

Added line #L57 was not covered by tests
return ""
}
return string(a)
Expand All @@ -65,7 +65,7 @@
tmpl := template.Must(template.New("").Funcs(funcMap).Parse(configTemplate))

if err := tmpl.Execute(c.Writer, configData); err != nil {
log.Error().Err(err).Msgf("could not execute template")
log.Error().Err(err).Msg("could not execute template")

Check warning on line 68 in server/web/config.go

View check run for this annotation

Codecov / codecov/patch

server/web/config.go#L68

Added line #L68 was not covered by tests
c.AbortWithStatus(http.StatusInternalServerError)
return
}
Expand Down
Loading