mirror of
https://github.com/pomerium/pomerium.git
synced 2025-06-05 20:32:57 +02:00
core/logs: remove warnings (#5235)
* core/logs: remove warnings * switch to error
This commit is contained in:
parent
556b2e0d73
commit
d062f9d68d
32 changed files with 70 additions and 78 deletions
|
@ -267,7 +267,7 @@ func (s *Stateful) RevokeSession(
|
|||
})
|
||||
if err != nil {
|
||||
err = fmt.Errorf("couldn't get session to be revoked: %w", err)
|
||||
log.Ctx(ctx).Warn().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
log.Ctx(ctx).Error().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
return ""
|
||||
}
|
||||
|
||||
|
@ -276,7 +276,7 @@ func (s *Stateful) RevokeSession(
|
|||
var sess session.Session
|
||||
if err := record.GetData().UnmarshalTo(&sess); err != nil {
|
||||
err = fmt.Errorf("couldn't unmarshal data of session to be revoked: %w", err)
|
||||
log.Ctx(ctx).Warn().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
log.Ctx(ctx).Error().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
return ""
|
||||
}
|
||||
|
||||
|
@ -284,7 +284,7 @@ func (s *Stateful) RevokeSession(
|
|||
if sess.OauthToken != nil {
|
||||
rawIDToken = sess.GetIdToken().GetRaw()
|
||||
if err := authenticator.Revoke(ctx, manager.FromOAuthToken(sess.OauthToken)); err != nil {
|
||||
log.Ctx(ctx).Warn().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
log.Ctx(ctx).Error().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -293,7 +293,7 @@ func (s *Stateful) RevokeSession(
|
|||
Records: []*databroker.Record{record},
|
||||
})
|
||||
if err != nil {
|
||||
log.Ctx(ctx).Warn().Err(err).
|
||||
log.Ctx(ctx).Error().Err(err).
|
||||
Msg("authenticate: failed to delete session from session store")
|
||||
}
|
||||
return rawIDToken
|
||||
|
|
|
@ -259,7 +259,7 @@ func (s *Stateless) RevokeSession(
|
|||
oauthToken := new(oauth2.Token)
|
||||
_ = json.Unmarshal(profile.GetOauthToken(), oauthToken)
|
||||
if err := authenticator.Revoke(ctx, oauthToken); err != nil {
|
||||
log.Ctx(ctx).Warn().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
log.Ctx(ctx).Error().Err(err).Msg("authenticate: failed to revoke access token")
|
||||
}
|
||||
|
||||
return string(profile.GetIdToken())
|
||||
|
@ -293,7 +293,7 @@ func (s *Stateless) logAuthenticateEvent(r *http.Request, profile *identitypb.Pr
|
|||
ctx := r.Context()
|
||||
pub, params, err := hpke.DecryptURLValues(s.hpkePrivateKey, r.Form)
|
||||
if err != nil {
|
||||
log.Warn(ctx).Err(err).Msg("log authenticate event: failed to decrypt request params")
|
||||
log.Error(ctx).Err(err).Msg("log authenticate event: failed to decrypt request params")
|
||||
}
|
||||
|
||||
evt := events.AuthEvent{
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue