@@ -390,21 +390,21 @@ func (f *tokenOidcFilter) internalServerError(ctx filters.FilterContext) {
390
390
func (f * tokenOidcFilter ) doOauthRedirect (ctx filters.FilterContext , cookies []* http.Cookie ) {
391
391
nonce , err := f .encrypter .CreateNonce ()
392
392
if err != nil {
393
- log .Errorf ("Failed to create nonce: %v." , err )
393
+ ctx . Logger () .Errorf ("Failed to create nonce: %v." , err )
394
394
f .internalServerError (ctx )
395
395
return
396
396
}
397
397
398
398
redirectUrl := ctx .Request ().URL .String ()
399
399
statePlain , err := createState (nonce , redirectUrl )
400
400
if err != nil {
401
- log .Errorf ("Failed to create oauth2 state: %v." , err )
401
+ ctx . Logger () .Errorf ("Failed to create oauth2 state: %v." , err )
402
402
f .internalServerError (ctx )
403
403
return
404
404
}
405
405
stateEnc , err := f .encrypter .Encrypt (statePlain )
406
406
if err != nil {
407
- log .Errorf ("Failed to encrypt data block: %v." , err )
407
+ ctx . Logger () .Errorf ("Failed to encrypt data block: %v." , err )
408
408
f .internalServerError (ctx )
409
409
return
410
410
}
@@ -431,7 +431,7 @@ func (f *tokenOidcFilter) doOauthRedirect(ctx filters.FilterContext, cookies []*
431
431
for _ , cookie := range cookies {
432
432
rsp .Header .Add ("Set-Cookie" , cookie .String ())
433
433
}
434
- log .Debugf ("serve redirect: plaintextState:%s to Location: %s" , statePlain , rsp .Header .Get ("Location" ))
434
+ ctx . Logger () .Debugf ("serve redirect: plaintextState:%s to Location: %s" , statePlain , rsp .Header .Get ("Location" ))
435
435
ctx .Serve (rsp )
436
436
}
437
437
@@ -520,7 +520,7 @@ func mergerCookies(cookies []*http.Cookie) *http.Cookie {
520
520
}
521
521
522
522
func (f * tokenOidcFilter ) doDownstreamRedirect (ctx filters.FilterContext , oidcState []byte , maxAge time.Duration , redirectUrl string ) {
523
- log .Debugf ("Doing Downstream Redirect to :%s" , redirectUrl )
523
+ ctx . Logger () .Debugf ("Doing Downstream Redirect to :%s" , redirectUrl )
524
524
r := & http.Response {
525
525
StatusCode : http .StatusTemporaryRedirect ,
526
526
Header : http.Header {
@@ -582,7 +582,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
582
582
oauthState , err := f .getCallbackState (ctx )
583
583
if err != nil {
584
584
if _ , ok := err .(* requestError ); ! ok {
585
- log .Errorf ("Error while retrieving callback state: %v." , err )
585
+ ctx . Logger () .Errorf ("Error while retrieving callback state: %v." , err )
586
586
}
587
587
588
588
unauthorized (
@@ -599,7 +599,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
599
599
oauth2Token , err = f .getTokenWithExchange (oauthState , ctx )
600
600
if err != nil {
601
601
if _ , ok := err .(* requestError ); ! ok {
602
- log .Errorf ("Error while getting token in callback: %v." , err )
602
+ ctx . Logger () .Errorf ("Error while getting token in callback: %v." , err )
603
603
}
604
604
605
605
unauthorized (
@@ -634,7 +634,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
634
634
oidcIDToken , err = f .getidtoken (ctx , oauth2Token )
635
635
if err != nil {
636
636
if _ , ok := err .(* requestError ); ! ok {
637
- log .Errorf ("Error while getting id token: %v" , err )
637
+ ctx . Logger () .Errorf ("Error while getting id token: %v" , err )
638
638
}
639
639
640
640
unauthorized (
@@ -663,7 +663,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
663
663
oidcIDToken , err = f .getidtoken (ctx , oauth2Token )
664
664
if err != nil {
665
665
if _ , ok := err .(* requestError ); ! ok {
666
- log .Errorf ("Error while getting id token: %v" , err )
666
+ ctx . Logger () .Errorf ("Error while getting id token: %v" , err )
667
667
}
668
668
669
669
unauthorized (
@@ -679,7 +679,7 @@ func (f *tokenOidcFilter) callbackEndpoint(ctx filters.FilterContext) {
679
679
claimsMap , sub , err = f .tokenClaims (ctx , oauth2Token )
680
680
if err != nil {
681
681
if _ , ok := err .(* requestError ); ! ok {
682
- log .Errorf ("Failed to get claims with error: %v" , err )
682
+ ctx . Logger () .Errorf ("Failed to get claims with error: %v" , err )
683
683
}
684
684
685
685
unauthorized (
@@ -825,7 +825,7 @@ func (f *tokenOidcFilter) Request(ctx filters.FilterContext) {
825
825
// adding upstream headers
826
826
err = setHeaders (f .upstreamHeaders , ctx , container )
827
827
if err != nil {
828
- log . Error ( err )
828
+ ctx . Logger (). Errorf ( "%v" , err )
829
829
f .internalServerError (ctx )
830
830
return
831
831
}
@@ -916,7 +916,7 @@ func (f *tokenOidcFilter) getCallbackState(ctx filters.FilterContext) (*OauthSta
916
916
return nil , requestErrorf ("token from state query is invalid: %v" , err )
917
917
}
918
918
919
- log .Debugf ("len(stateQueryPlain): %d, stateQueryEnc: %d, stateQueryEncHex: %d" , len (stateQueryPlain ), len (stateQueryEnc ), len (stateQueryEncHex ))
919
+ ctx . Logger () .Debugf ("len(stateQueryPlain): %d, stateQueryEnc: %d, stateQueryEncHex: %d" , len (stateQueryPlain ), len (stateQueryEnc ), len (stateQueryEncHex ))
920
920
921
921
state , err := extractState (stateQueryPlain )
922
922
if err != nil {
0 commit comments