feat: add log level for better debugging
This commit is contained in:
@@ -41,6 +41,7 @@ var ServerCmd = &cobra.Command{
|
||||
if err != nil {
|
||||
logger.Fatal("Could not load configuration: %v", err)
|
||||
}
|
||||
gs.SetEnv()
|
||||
if err := gs.Start(ctx); err != nil {
|
||||
logger.Fatal("Could not start server: %v", err)
|
||||
|
||||
|
||||
@@ -16,9 +16,10 @@ gateway:
|
||||
readTimeout: 15
|
||||
idleTimeout: 30
|
||||
# Rate limiting
|
||||
rateLimiter: 0
|
||||
rateLimit: 0
|
||||
accessLog: /dev/Stdout
|
||||
errorLog: /dev/stderr
|
||||
logLevel: info
|
||||
disableRouteHealthCheckError: false
|
||||
disableDisplayRouteOnStart: false
|
||||
disableKeepAlive: false
|
||||
|
||||
30
docs/quickstart/logging.md
Normal file
30
docs/quickstart/logging.md
Normal file
@@ -0,0 +1,30 @@
|
||||
---
|
||||
title: General troubleshooting steps
|
||||
layout: default
|
||||
parent: Quickstart
|
||||
nav_order: 6
|
||||
---
|
||||
|
||||
|
||||
# Logging
|
||||
|
||||
### Set the log level to TRACE
|
||||
|
||||
Setting the log level to trace configures the server to trace-log all the headers given in forward auth requests.
|
||||
|
||||
This is helpful to confirm that certain required Headers are correctly forwarded from the reverse proxy.
|
||||
|
||||
|
||||
|
||||
### When using the environment variable
|
||||
|
||||
Set the Goma log level to TRACE:
|
||||
|
||||
Add the following block to your .env file:
|
||||
```shell
|
||||
GOMA_LOG_LEVEL=trace
|
||||
```
|
||||
|
||||
### When using a configuration file
|
||||
|
||||
Edit the Goma settings and set `logLevel: trace`.
|
||||
@@ -2,7 +2,7 @@
|
||||
title: SSL Certificate
|
||||
layout: default
|
||||
parent: Quickstart
|
||||
nav_order: 4
|
||||
nav_order: 5
|
||||
---
|
||||
|
||||
|
||||
|
||||
@@ -102,9 +102,19 @@ func (GatewayServer) Config(configFile string) (*GatewayServer, error) {
|
||||
middlewares: c.Middlewares,
|
||||
}, nil
|
||||
}
|
||||
func GetConfigPaths() string {
|
||||
return util.GetStringEnv("GOMAY_CONFIG_FILE", ConfigFile)
|
||||
|
||||
// SetEnv sets environment variables
|
||||
func (gatewayServer GatewayServer) SetEnv() {
|
||||
util.SetEnv("GOMA_LOG_LEVEL", gatewayServer.gateway.LogLevel)
|
||||
util.SetEnv("GOMA_ERROR_LOG", gatewayServer.gateway.ErrorLog)
|
||||
util.SetEnv("GOMA_ACCESS_LOG", gatewayServer.gateway.AccessLog)
|
||||
}
|
||||
|
||||
func GetConfigPaths() string {
|
||||
return util.GetStringEnv("GOMA_CONFIG_FILE", ConfigFile)
|
||||
}
|
||||
|
||||
// InitConfig initializes configs
|
||||
func InitConfig(cmd *cobra.Command) {
|
||||
configFile, _ := cmd.Flags().GetString("output")
|
||||
if configFile == "" {
|
||||
@@ -114,6 +124,8 @@ func InitConfig(cmd *cobra.Command) {
|
||||
return
|
||||
|
||||
}
|
||||
|
||||
// initConfig initializes configs
|
||||
func initConfig(configFile string) {
|
||||
if configFile == "" {
|
||||
configFile = GetConfigPaths()
|
||||
|
||||
@@ -65,7 +65,7 @@ func ProxyErrorHandler(w http.ResponseWriter, r *http.Request, err error) {
|
||||
|
||||
// HealthCheckHandler handles health check of routes
|
||||
func (heathRoute HealthCheckRoute) HealthCheckHandler(w http.ResponseWriter, r *http.Request) {
|
||||
logger.Info("%s %s %s %s", r.Method, r.RemoteAddr, r.URL, r.UserAgent())
|
||||
logger.Debug("%s %s %s %s", r.Method, r.RemoteAddr, r.URL, r.UserAgent())
|
||||
wg := sync.WaitGroup{}
|
||||
wg.Add(len(heathRoute.Routes))
|
||||
var routes []HealthCheckRouteResponse
|
||||
@@ -80,11 +80,11 @@ func (heathRoute HealthCheckRoute) HealthCheckHandler(w http.ResponseWriter, r *
|
||||
}
|
||||
routes = append(routes, HealthCheckRouteResponse{Name: route.Name, Status: "unhealthy", Error: "Error: " + err.Error()})
|
||||
} else {
|
||||
logger.Info("Route %s is healthy", route.Name)
|
||||
logger.Debug("Route %s is healthy", route.Name)
|
||||
routes = append(routes, HealthCheckRouteResponse{Name: route.Name, Status: "healthy", Error: ""})
|
||||
}
|
||||
} else {
|
||||
logger.Warn("Route %s's healthCheck is undefined", route.Name)
|
||||
logger.Debug("Route %s's healthCheck is undefined", route.Name)
|
||||
routes = append(routes, HealthCheckRouteResponse{Name: route.Name, Status: "undefined", Error: ""})
|
||||
}
|
||||
}()
|
||||
|
||||
@@ -46,7 +46,7 @@ func (intercept InterceptErrors) ErrorInterceptor(next http.Handler) http.Handle
|
||||
rec := newResponseRecorder(w)
|
||||
next.ServeHTTP(rec, r)
|
||||
if canIntercept(rec.statusCode, intercept.Errors) {
|
||||
logger.Error("Backend error")
|
||||
logger.Debug("Backend error")
|
||||
logger.Error("An error occurred from the backend with the status code: %d", rec.statusCode)
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
//Update Origin Cors Headers
|
||||
|
||||
@@ -82,6 +82,7 @@ func (jwtAuth JwtAuth) AuthMiddleware(next http.Handler) http.Handler {
|
||||
}
|
||||
return
|
||||
}
|
||||
logger.Trace("JWT Auth response headers: %v", authReq.Header)
|
||||
// Copy headers from the original request to the new request
|
||||
for name, values := range r.Header {
|
||||
for _, value := range values {
|
||||
@@ -96,8 +97,8 @@ func (jwtAuth JwtAuth) AuthMiddleware(next http.Handler) http.Handler {
|
||||
client := &http.Client{}
|
||||
authResp, err := client.Do(authReq)
|
||||
if err != nil || authResp.StatusCode != http.StatusOK {
|
||||
logger.Info("%s %s %s %s", r.Method, getRealIP(r), r.URL, r.UserAgent())
|
||||
logger.Warn("Proxy authentication error")
|
||||
logger.Debug("%s %s %s %s", r.Method, getRealIP(r), r.URL, r.UserAgent())
|
||||
logger.Debug("Proxy authentication error")
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusUnauthorized)
|
||||
err = json.NewEncoder(w).Encode(ProxyResponseError{
|
||||
@@ -139,10 +140,11 @@ func (jwtAuth JwtAuth) AuthMiddleware(next http.Handler) http.Handler {
|
||||
// AuthMiddleware checks for the Authorization header and verifies the credentials
|
||||
func (basicAuth AuthBasic) AuthMiddleware(next http.Handler) http.Handler {
|
||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
logger.Trace("Basic-Auth request headers: %v", r.Header)
|
||||
// Get the Authorization header
|
||||
authHeader := r.Header.Get("Authorization")
|
||||
if authHeader == "" {
|
||||
logger.Error("Proxy error, missing Authorization header")
|
||||
logger.Debug("Proxy error, missing Authorization header")
|
||||
w.Header().Set("WWW-Authenticate", `Basic realm="Restricted"`)
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusUnauthorized)
|
||||
@@ -175,7 +177,7 @@ func (basicAuth AuthBasic) AuthMiddleware(next http.Handler) http.Handler {
|
||||
// Decode the base64 encoded username:password string
|
||||
payload, err := base64.StdEncoding.DecodeString(authHeader[len("Basic "):])
|
||||
if err != nil {
|
||||
logger.Error("Proxy error, missing Basic Authorization header")
|
||||
logger.Debug("Proxy error, missing Basic Authorization header")
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusUnauthorized)
|
||||
err := json.NewEncoder(w).Encode(ProxyResponseError{
|
||||
|
||||
@@ -66,7 +66,7 @@ func (rl *RateLimiter) RateLimitMiddleware() mux.MiddlewareFunc {
|
||||
rl.mu.Unlock()
|
||||
|
||||
if client.RequestCount > rl.Requests {
|
||||
logger.Error("Too many requests from IP: %s %s %s", clientID, r.URL, r.UserAgent())
|
||||
logger.Debug("Too many requests from IP: %s %s %s", clientID, r.URL, r.UserAgent())
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(http.StatusTooManyRequests)
|
||||
//Update Origin Cors Headers
|
||||
|
||||
@@ -30,6 +30,8 @@ import (
|
||||
func (proxyRoute ProxyRoute) ProxyHandler() http.HandlerFunc {
|
||||
return func(w http.ResponseWriter, r *http.Request) {
|
||||
logger.Info("%s %s %s %s", r.Method, getRealIP(r), r.URL.Path, r.UserAgent())
|
||||
logger.Trace("Request params: %s", r.URL.RawQuery)
|
||||
logger.Trace("Request Headers: %s", r.Header)
|
||||
// Check Method if is allowed
|
||||
if len(proxyRoute.methods) > 0 {
|
||||
if !slices.Contains(proxyRoute.methods, r.Method) {
|
||||
|
||||
@@ -188,6 +188,7 @@ type Gateway struct {
|
||||
BlockCommonExploits bool `yaml:"blockCommonExploits"`
|
||||
AccessLog string `yaml:"accessLog" env:"GOMA_ACCESS_LOG, overwrite"`
|
||||
ErrorLog string `yaml:"errorLog" env:"GOMA_ERROR_LOG=, overwrite"`
|
||||
LogLevel string `yaml:"logLevel" env:"GOMA_LOG_LEVEL, overwrite"`
|
||||
// DisableHealthCheckStatus enable and disable routes health check
|
||||
DisableHealthCheckStatus bool `yaml:"disableHealthCheckStatus"`
|
||||
// DisableRouteHealthCheckError allows enabling and disabling backend healthcheck errors
|
||||
|
||||
@@ -33,23 +33,15 @@ type Logger struct {
|
||||
// Info returns info log
|
||||
func Info(msg string, args ...interface{}) {
|
||||
log.SetOutput(getStd(util.GetStringEnv("GOMA_ACCESS_LOG", "/dev/stdout")))
|
||||
formattedMessage := fmt.Sprintf(msg, args...)
|
||||
if len(args) == 0 {
|
||||
log.Printf("INFO: %s\n", msg)
|
||||
} else {
|
||||
log.Printf("INFO: %s\n", formattedMessage)
|
||||
}
|
||||
logWithCaller("INFO", msg, args...)
|
||||
|
||||
}
|
||||
|
||||
// Warn returns warning log
|
||||
func Warn(msg string, args ...interface{}) {
|
||||
log.SetOutput(getStd(util.GetStringEnv("GOMA_ACCESS_LOG", "/dev/stdout")))
|
||||
formattedMessage := fmt.Sprintf(msg, args...)
|
||||
if len(args) == 0 {
|
||||
log.Printf("WARN: %s\n", msg)
|
||||
} else {
|
||||
log.Printf("WARN: %s\n", formattedMessage)
|
||||
}
|
||||
logWithCaller("WARN", msg, args...)
|
||||
|
||||
}
|
||||
|
||||
// Error logs error messages
|
||||
@@ -60,36 +52,47 @@ func Error(msg string, args ...interface{}) {
|
||||
|
||||
func Fatal(msg string, args ...interface{}) {
|
||||
log.SetOutput(os.Stdout)
|
||||
formattedMessage := fmt.Sprintf(msg, args...)
|
||||
if len(args) == 0 {
|
||||
log.Printf("ERROR: %s\n", msg)
|
||||
} else {
|
||||
log.Printf("ERROR: %s\n", formattedMessage)
|
||||
}
|
||||
|
||||
logWithCaller("ERROR", msg, args...)
|
||||
os.Exit(1)
|
||||
}
|
||||
|
||||
func Debug(msg string, args ...interface{}) {
|
||||
log.SetOutput(getStd(util.GetStringEnv("GOMA_ACCESS_LOG", "/dev/stdout")))
|
||||
logLevel := util.GetStringEnv("GOMA_LOG_LEVEL", "")
|
||||
if logLevel == "trace" || logLevel == "debug" {
|
||||
logWithCaller("DEBUG", msg, args...)
|
||||
}
|
||||
|
||||
}
|
||||
func Trace(msg string, args ...interface{}) {
|
||||
log.SetOutput(getStd(util.GetStringEnv("GOMA_ACCESS_LOG", "/dev/stdout")))
|
||||
logLevel := util.GetStringEnv("GOMA_LOG_LEVEL", "")
|
||||
if logLevel == "trace" {
|
||||
logWithCaller("DEBUG", msg, args...)
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
// Helper function to format and log messages with file and line number
|
||||
func logWithCaller(level, msg string, args ...interface{}) {
|
||||
formattedMessage := fmt.Sprintf(msg, args...)
|
||||
_, file, line, ok := runtime.Caller(2) // Get the caller's file and line number (skip 2 frames)
|
||||
// Format message if there are additional arguments
|
||||
formattedMessage := msg
|
||||
if len(args) > 0 {
|
||||
formattedMessage = fmt.Sprintf(msg, args...)
|
||||
}
|
||||
|
||||
// Get the caller's file and line number (skip 2 frames)
|
||||
_, file, line, ok := runtime.Caller(2)
|
||||
if !ok {
|
||||
file = "unknown"
|
||||
line = 0
|
||||
}
|
||||
|
||||
if len(args) == 0 {
|
||||
log.Printf("%s: %s (File: %s, Line: %d)\n", level, msg, file, line)
|
||||
} else {
|
||||
// Log message with caller information if GOMA_LOG_LEVEL is trace
|
||||
logLevel := util.GetStringEnv("GOMA_LOG_LEVEL", "")
|
||||
if logLevel == "trace" {
|
||||
log.Printf("%s: %s (File: %s, Line: %d)\n", level, formattedMessage, file, line)
|
||||
} else {
|
||||
log.Printf("%s: %s\n", level, formattedMessage)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -73,10 +73,12 @@ func GetBoolEnv(key string, defaultValue bool) bool {
|
||||
|
||||
// SetEnv Set env
|
||||
func SetEnv(name, value string) {
|
||||
if len(value) != 0 {
|
||||
err := os.Setenv(name, value)
|
||||
if err != nil {
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
func MergeSlices(slice1, slice2 []string) []string {
|
||||
|
||||
Reference in New Issue
Block a user