2021-01-27 17:46:35 +00:00
|
|
|
// Copyright 2020 The Gitea Authors. All rights reserved.
|
2022-11-27 18:20:29 +00:00
|
|
|
// SPDX-License-Identifier: MIT
|
2021-01-27 17:46:35 +00:00
|
|
|
|
|
|
|
package context
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2021-08-04 17:26:30 +00:00
|
|
|
"context"
|
2023-03-10 15:54:32 +00:00
|
|
|
"fmt"
|
2021-01-27 17:46:35 +00:00
|
|
|
"net/http"
|
2023-03-10 15:54:32 +00:00
|
|
|
"strings"
|
2023-02-21 02:22:13 +00:00
|
|
|
"text/template"
|
2021-01-27 17:46:35 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"code.gitea.io/gitea/modules/log"
|
|
|
|
"code.gitea.io/gitea/modules/setting"
|
|
|
|
)
|
|
|
|
|
|
|
|
type routerLoggerOptions struct {
|
|
|
|
req *http.Request
|
|
|
|
Identity *string
|
|
|
|
Start *time.Time
|
|
|
|
ResponseWriter http.ResponseWriter
|
|
|
|
Ctx map[string]interface{}
|
2023-03-10 15:54:32 +00:00
|
|
|
RequestID *string
|
2021-01-27 17:46:35 +00:00
|
|
|
}
|
|
|
|
|
2021-08-04 17:26:30 +00:00
|
|
|
var signedUserNameStringPointerKey interface{} = "signedUserNameStringPointerKey"
|
|
|
|
|
2023-03-10 15:54:32 +00:00
|
|
|
const keyOfRequestIDInTemplate = ".RequestID"
|
|
|
|
|
|
|
|
// According to:
|
|
|
|
// TraceId: A valid trace identifier is a 16-byte array with at least one non-zero byte
|
|
|
|
// MD5 output is 16 or 32 bytes: md5-bytes is 16, md5-hex is 32
|
|
|
|
// SHA1: similar, SHA1-bytes is 20, SHA1-hex is 40.
|
|
|
|
// UUID is 128-bit, 32 hex chars, 36 ASCII chars with 4 dashes
|
|
|
|
// So, we accept a Request ID with a maximum character length of 40
|
|
|
|
const maxRequestIDByteLength = 40
|
|
|
|
|
|
|
|
func parseRequestIDFromRequestHeader(req *http.Request) string {
|
|
|
|
requestID := "-"
|
|
|
|
for _, key := range setting.Log.RequestIDHeaders {
|
|
|
|
if req.Header.Get(key) != "" {
|
|
|
|
requestID = req.Header.Get(key)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(requestID) > maxRequestIDByteLength {
|
|
|
|
requestID = fmt.Sprintf("%s...", requestID[:maxRequestIDByteLength])
|
|
|
|
}
|
|
|
|
return requestID
|
|
|
|
}
|
|
|
|
|
2021-01-27 17:46:35 +00:00
|
|
|
// AccessLogger returns a middleware to log access logger
|
|
|
|
func AccessLogger() func(http.Handler) http.Handler {
|
|
|
|
logger := log.GetLogger("access")
|
2023-03-10 15:54:32 +00:00
|
|
|
needRequestID := len(setting.Log.RequestIDHeaders) > 0 && strings.Contains(setting.Log.AccessLogTemplate, keyOfRequestIDInTemplate)
|
2023-02-19 16:12:01 +00:00
|
|
|
logTemplate, _ := template.New("log").Parse(setting.Log.AccessLogTemplate)
|
2021-01-27 17:46:35 +00:00
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
|
|
|
start := time.Now()
|
|
|
|
identity := "-"
|
2021-08-04 17:26:30 +00:00
|
|
|
r := req.WithContext(context.WithValue(req.Context(), signedUserNameStringPointerKey, &identity))
|
|
|
|
|
2023-03-10 15:54:32 +00:00
|
|
|
var requestID string
|
|
|
|
if needRequestID {
|
|
|
|
requestID = parseRequestIDFromRequestHeader(req)
|
|
|
|
}
|
|
|
|
|
2021-08-04 17:26:30 +00:00
|
|
|
next.ServeHTTP(w, r)
|
2021-01-27 17:46:35 +00:00
|
|
|
rw := w.(ResponseWriter)
|
|
|
|
|
|
|
|
buf := bytes.NewBuffer([]byte{})
|
|
|
|
err := logTemplate.Execute(buf, routerLoggerOptions{
|
|
|
|
req: req,
|
|
|
|
Identity: &identity,
|
|
|
|
Start: &start,
|
|
|
|
ResponseWriter: rw,
|
|
|
|
Ctx: map[string]interface{}{
|
|
|
|
"RemoteAddr": req.RemoteAddr,
|
|
|
|
"Req": req,
|
|
|
|
},
|
2023-03-10 15:54:32 +00:00
|
|
|
RequestID: &requestID,
|
2021-01-27 17:46:35 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Could not set up chi access logger: %v", err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
err = logger.SendLog(log.INFO, "", "", 0, buf.String(), "")
|
|
|
|
if err != nil {
|
|
|
|
log.Error("Could not set up chi access logger: %v", err.Error())
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|