2021-08-02 22:06:27 +00:00
|
|
|
package logging
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"context"
|
2021-11-15 14:11:38 +00:00
|
|
|
"errors"
|
Add UUID to Fleet errors and clean up error msgs (#10411)
#8129
Apart from fixing the issue in #8129, this change also introduces UUIDs
to Fleet errors. To be able to match a returned error from the API to a
error in the Fleet logs. See
https://fleetdm.slack.com/archives/C019WG4GH0A/p1677780622769939 for
more context.
Samples with the changes in this PR:
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d ''
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "Expected JSON Body"
}
],
"uuid": "a01f6e10-354c-4ff0-b96e-1f64adb500b0"
}
```
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d 'asd'
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "json decoder error"
}
],
"uuid": "5f716a64-7550-464b-a1dd-e6a505a9f89d"
}
```
```
curl -k -X GET -H "Authorization: Bearer badtoken" "https://localhost:8080/api/latest/fleet/teams"
{
"message": "Authentication required",
"errors": [
{
"name": "base",
"reason": "Authentication required"
}
],
"uuid": "efe45bc0-f956-4bf9-ba4f-aa9020a9aaaf"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Authorization header required",
"errors": [
{
"name": "base",
"reason": "Authorization header required"
}
],
"uuid": "57f78cd0-4559-464f-9df7-36c9ef7c89b3"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Permission Denied",
"uuid": "7f0220ad-6de7-4faf-8b6c-8d7ff9d2ca06"
}
```
- [X] Changes file added for user-visible changes in `changes/` or
`orbit/changes/`.
See [Changes
files](https://fleetdm.com/docs/contributing/committing-changes#changes-files)
for more information.
- [X] Documented any API changes (docs/Using-Fleet/REST-API.md or
docs/Contributing/API-for-contributors.md)
- ~[ ] Documented any permissions changes~
- ~[ ] Input data is properly validated, `SELECT *` is avoided, SQL
injection is prevented (using placeholders for values in statements)~
- ~[ ] Added support on fleet's osquery simulator `cmd/osquery-perf` for
new osquery data ingestion features.~
- [X] Added/updated tests
- [X] Manual QA for all new/changed functionality
- For Orbit and Fleet Desktop changes:
- [X] Manual QA must be performed in the three main OSs, macOS, Windows
and Linux.
- ~[ ] Auto-update manual QA, from released version of component to new
version (see [tools/tuf/test](../tools/tuf/test/README.md)).~
2023-03-13 16:44:06 +00:00
|
|
|
"strings"
|
2021-10-26 14:33:31 +00:00
|
|
|
"sync"
|
2021-08-02 22:06:27 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
|
|
"github.com/fleetdm/fleet/v4/server/contexts/viewer"
|
|
|
|
|
"github.com/fleetdm/fleet/v4/server/fleet"
|
|
|
|
|
kithttp "github.com/go-kit/kit/transport/http"
|
2024-06-17 13:27:31 +00:00
|
|
|
kitlog "github.com/go-kit/log"
|
|
|
|
|
"github.com/go-kit/log/level"
|
2021-08-02 22:06:27 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
type key int
|
|
|
|
|
|
|
|
|
|
const loggingKey key = 0
|
|
|
|
|
|
|
|
|
|
// NewContext creates a new context.Context with a LoggingContext.
|
|
|
|
|
func NewContext(ctx context.Context, logging *LoggingContext) context.Context {
|
|
|
|
|
return context.WithValue(ctx, loggingKey, logging)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// FromContext returns a pointer to the LoggingContext.
|
|
|
|
|
func FromContext(ctx context.Context) (*LoggingContext, bool) {
|
|
|
|
|
v, ok := ctx.Value(loggingKey).(*LoggingContext)
|
|
|
|
|
return v, ok
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// WithStartTime returns a context with logging.StartTime marked as the current time
|
|
|
|
|
func WithStartTime(ctx context.Context) context.Context {
|
|
|
|
|
if logCtx, ok := FromContext(ctx); ok {
|
2021-10-26 14:33:31 +00:00
|
|
|
logCtx.SetStartTime()
|
2021-08-02 22:06:27 +00:00
|
|
|
}
|
|
|
|
|
return ctx
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// WithErr returns a context with logging.Err set as the error provided
|
2021-08-04 13:11:51 +00:00
|
|
|
func WithErr(ctx context.Context, err ...error) context.Context {
|
2021-08-02 22:06:27 +00:00
|
|
|
if logCtx, ok := FromContext(ctx); ok {
|
2021-10-26 14:33:31 +00:00
|
|
|
logCtx.SetErrs(err...)
|
2021-08-02 22:06:27 +00:00
|
|
|
}
|
|
|
|
|
return ctx
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// WithNoUser returns a context with logging.SkipUser set to true so user won't be logged
|
|
|
|
|
func WithNoUser(ctx context.Context) context.Context {
|
|
|
|
|
if logCtx, ok := FromContext(ctx); ok {
|
2021-10-26 14:33:31 +00:00
|
|
|
logCtx.SetSkipUser()
|
2021-08-02 22:06:27 +00:00
|
|
|
}
|
|
|
|
|
return ctx
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// WithExtras returns a context with logging.Extras set as the values provided
|
|
|
|
|
func WithExtras(ctx context.Context, extras ...interface{}) context.Context {
|
|
|
|
|
if logCtx, ok := FromContext(ctx); ok {
|
2021-10-26 14:33:31 +00:00
|
|
|
logCtx.SetExtras(extras...)
|
2021-08-02 22:06:27 +00:00
|
|
|
}
|
|
|
|
|
return ctx
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func WithLevel(ctx context.Context, level func(kitlog.Logger) kitlog.Logger) context.Context {
|
|
|
|
|
if logCtx, ok := FromContext(ctx); ok {
|
2021-10-26 14:33:31 +00:00
|
|
|
logCtx.SetForceLevel(level)
|
2021-08-02 22:06:27 +00:00
|
|
|
}
|
|
|
|
|
return ctx
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// LoggingContext contains the context information for logging the current request
|
|
|
|
|
type LoggingContext struct {
|
2021-10-26 14:33:31 +00:00
|
|
|
l sync.Mutex
|
|
|
|
|
|
2021-08-02 22:06:27 +00:00
|
|
|
StartTime time.Time
|
2021-08-04 13:11:51 +00:00
|
|
|
Errs []error
|
2021-08-02 22:06:27 +00:00
|
|
|
Extras []interface{}
|
|
|
|
|
SkipUser bool
|
|
|
|
|
ForceLevel func(kitlog.Logger) kitlog.Logger
|
|
|
|
|
}
|
|
|
|
|
|
2021-10-26 14:33:31 +00:00
|
|
|
func (l *LoggingContext) SetForceLevel(level func(kitlog.Logger) kitlog.Logger) {
|
|
|
|
|
l.l.Lock()
|
|
|
|
|
defer l.l.Unlock()
|
|
|
|
|
l.ForceLevel = level
|
|
|
|
|
}
|
2021-12-07 15:52:43 +00:00
|
|
|
|
2021-10-26 14:33:31 +00:00
|
|
|
func (l *LoggingContext) SetExtras(extras ...interface{}) {
|
|
|
|
|
l.l.Lock()
|
|
|
|
|
defer l.l.Unlock()
|
|
|
|
|
l.Extras = append(l.Extras, extras...)
|
|
|
|
|
}
|
2021-12-07 15:52:43 +00:00
|
|
|
|
2021-10-26 14:33:31 +00:00
|
|
|
func (l *LoggingContext) SetSkipUser() {
|
|
|
|
|
l.l.Lock()
|
|
|
|
|
defer l.l.Unlock()
|
|
|
|
|
l.SkipUser = true
|
|
|
|
|
}
|
2021-12-07 15:52:43 +00:00
|
|
|
|
2021-10-26 14:33:31 +00:00
|
|
|
func (l *LoggingContext) SetStartTime() {
|
|
|
|
|
l.l.Lock()
|
|
|
|
|
defer l.l.Unlock()
|
|
|
|
|
l.StartTime = time.Now()
|
|
|
|
|
}
|
2021-12-07 15:52:43 +00:00
|
|
|
|
2021-10-26 14:33:31 +00:00
|
|
|
func (l *LoggingContext) SetErrs(err ...error) {
|
|
|
|
|
l.l.Lock()
|
|
|
|
|
defer l.l.Unlock()
|
|
|
|
|
l.Errs = append(l.Errs, err...)
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-02 22:06:27 +00:00
|
|
|
// Log logs the data within the context
|
|
|
|
|
func (l *LoggingContext) Log(ctx context.Context, logger kitlog.Logger) {
|
2021-10-26 14:33:31 +00:00
|
|
|
l.l.Lock()
|
|
|
|
|
defer l.l.Unlock()
|
|
|
|
|
|
2021-12-07 15:52:43 +00:00
|
|
|
switch {
|
|
|
|
|
case len(l.Errs) > 0:
|
|
|
|
|
logger = level.Error(logger)
|
|
|
|
|
case l.ForceLevel != nil:
|
2021-08-02 22:06:27 +00:00
|
|
|
logger = l.ForceLevel(logger)
|
2021-12-07 15:52:43 +00:00
|
|
|
default:
|
2021-08-02 22:06:27 +00:00
|
|
|
logger = level.Debug(logger)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var keyvals []interface{}
|
|
|
|
|
|
|
|
|
|
if !l.SkipUser {
|
|
|
|
|
loggedInUser := "unauthenticated"
|
|
|
|
|
vc, ok := viewer.FromContext(ctx)
|
|
|
|
|
if ok {
|
|
|
|
|
loggedInUser = vc.Email()
|
|
|
|
|
}
|
|
|
|
|
keyvals = append(keyvals, "user", loggedInUser)
|
|
|
|
|
}
|
2021-08-04 13:11:51 +00:00
|
|
|
requestMethod, ok := ctx.Value(kithttp.ContextKeyRequestMethod).(string)
|
|
|
|
|
if !ok {
|
|
|
|
|
requestMethod = ""
|
2021-08-02 22:06:27 +00:00
|
|
|
}
|
2021-08-04 13:11:51 +00:00
|
|
|
requestURI, ok := ctx.Value(kithttp.ContextKeyRequestURI).(string)
|
|
|
|
|
if !ok {
|
|
|
|
|
requestURI = ""
|
|
|
|
|
}
|
|
|
|
|
keyvals = append(keyvals, "method", requestMethod, "uri", requestURI, "took", time.Since(l.StartTime))
|
2021-08-02 22:06:27 +00:00
|
|
|
|
|
|
|
|
if len(l.Extras) > 0 {
|
|
|
|
|
keyvals = append(keyvals, l.Extras...)
|
|
|
|
|
}
|
|
|
|
|
|
2021-08-04 13:11:51 +00:00
|
|
|
if len(l.Errs) > 0 {
|
2021-10-07 21:15:40 +00:00
|
|
|
// Going for string concatenation here instead of json.Marshal mostly to not have to deal with error handling
|
|
|
|
|
// within this method. kitlog doesn't support slices of strings
|
Add UUID to Fleet errors and clean up error msgs (#10411)
#8129
Apart from fixing the issue in #8129, this change also introduces UUIDs
to Fleet errors. To be able to match a returned error from the API to a
error in the Fleet logs. See
https://fleetdm.slack.com/archives/C019WG4GH0A/p1677780622769939 for
more context.
Samples with the changes in this PR:
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d ''
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "Expected JSON Body"
}
],
"uuid": "a01f6e10-354c-4ff0-b96e-1f64adb500b0"
}
```
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d 'asd'
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "json decoder error"
}
],
"uuid": "5f716a64-7550-464b-a1dd-e6a505a9f89d"
}
```
```
curl -k -X GET -H "Authorization: Bearer badtoken" "https://localhost:8080/api/latest/fleet/teams"
{
"message": "Authentication required",
"errors": [
{
"name": "base",
"reason": "Authentication required"
}
],
"uuid": "efe45bc0-f956-4bf9-ba4f-aa9020a9aaaf"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Authorization header required",
"errors": [
{
"name": "base",
"reason": "Authorization header required"
}
],
"uuid": "57f78cd0-4559-464f-9df7-36c9ef7c89b3"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Permission Denied",
"uuid": "7f0220ad-6de7-4faf-8b6c-8d7ff9d2ca06"
}
```
- [X] Changes file added for user-visible changes in `changes/` or
`orbit/changes/`.
See [Changes
files](https://fleetdm.com/docs/contributing/committing-changes#changes-files)
for more information.
- [X] Documented any API changes (docs/Using-Fleet/REST-API.md or
docs/Contributing/API-for-contributors.md)
- ~[ ] Documented any permissions changes~
- ~[ ] Input data is properly validated, `SELECT *` is avoided, SQL
injection is prevented (using placeholders for values in statements)~
- ~[ ] Added support on fleet's osquery simulator `cmd/osquery-perf` for
new osquery data ingestion features.~
- [X] Added/updated tests
- [X] Manual QA for all new/changed functionality
- For Orbit and Fleet Desktop changes:
- [X] Manual QA must be performed in the three main OSs, macOS, Windows
and Linux.
- ~[ ] Auto-update manual QA, from released version of component to new
version (see [tools/tuf/test](../tools/tuf/test/README.md)).~
2023-03-13 16:44:06 +00:00
|
|
|
var (
|
|
|
|
|
errs string
|
|
|
|
|
internalErrs string
|
|
|
|
|
uuids []string
|
|
|
|
|
)
|
2021-10-07 21:15:40 +00:00
|
|
|
separator := " || "
|
2021-08-04 13:11:51 +00:00
|
|
|
for _, err := range l.Errs {
|
2021-11-15 14:11:38 +00:00
|
|
|
var ewi fleet.ErrWithInternal
|
|
|
|
|
if errors.As(err, &ewi) {
|
2021-10-07 21:15:40 +00:00
|
|
|
if internalErrs == "" {
|
2021-11-15 14:11:38 +00:00
|
|
|
internalErrs = ewi.Internal()
|
2021-10-07 21:15:40 +00:00
|
|
|
} else {
|
2021-11-15 14:11:38 +00:00
|
|
|
internalErrs += separator + ewi.Internal()
|
2021-10-07 21:15:40 +00:00
|
|
|
}
|
2021-08-04 13:11:51 +00:00
|
|
|
} else {
|
2021-10-07 21:15:40 +00:00
|
|
|
if errs == "" {
|
|
|
|
|
errs = err.Error()
|
|
|
|
|
} else {
|
|
|
|
|
errs += separator + err.Error()
|
|
|
|
|
}
|
2021-08-04 13:11:51 +00:00
|
|
|
}
|
Add UUID to Fleet errors and clean up error msgs (#10411)
#8129
Apart from fixing the issue in #8129, this change also introduces UUIDs
to Fleet errors. To be able to match a returned error from the API to a
error in the Fleet logs. See
https://fleetdm.slack.com/archives/C019WG4GH0A/p1677780622769939 for
more context.
Samples with the changes in this PR:
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d ''
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "Expected JSON Body"
}
],
"uuid": "a01f6e10-354c-4ff0-b96e-1f64adb500b0"
}
```
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d 'asd'
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "json decoder error"
}
],
"uuid": "5f716a64-7550-464b-a1dd-e6a505a9f89d"
}
```
```
curl -k -X GET -H "Authorization: Bearer badtoken" "https://localhost:8080/api/latest/fleet/teams"
{
"message": "Authentication required",
"errors": [
{
"name": "base",
"reason": "Authentication required"
}
],
"uuid": "efe45bc0-f956-4bf9-ba4f-aa9020a9aaaf"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Authorization header required",
"errors": [
{
"name": "base",
"reason": "Authorization header required"
}
],
"uuid": "57f78cd0-4559-464f-9df7-36c9ef7c89b3"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Permission Denied",
"uuid": "7f0220ad-6de7-4faf-8b6c-8d7ff9d2ca06"
}
```
- [X] Changes file added for user-visible changes in `changes/` or
`orbit/changes/`.
See [Changes
files](https://fleetdm.com/docs/contributing/committing-changes#changes-files)
for more information.
- [X] Documented any API changes (docs/Using-Fleet/REST-API.md or
docs/Contributing/API-for-contributors.md)
- ~[ ] Documented any permissions changes~
- ~[ ] Input data is properly validated, `SELECT *` is avoided, SQL
injection is prevented (using placeholders for values in statements)~
- ~[ ] Added support on fleet's osquery simulator `cmd/osquery-perf` for
new osquery data ingestion features.~
- [X] Added/updated tests
- [X] Manual QA for all new/changed functionality
- For Orbit and Fleet Desktop changes:
- [X] Manual QA must be performed in the three main OSs, macOS, Windows
and Linux.
- ~[ ] Auto-update manual QA, from released version of component to new
version (see [tools/tuf/test](../tools/tuf/test/README.md)).~
2023-03-13 16:44:06 +00:00
|
|
|
var ewuuid fleet.ErrorUUIDer
|
|
|
|
|
if errors.As(err, &ewuuid) {
|
|
|
|
|
if uuid := ewuuid.UUID(); uuid != "" {
|
|
|
|
|
uuids = append(uuids, uuid)
|
|
|
|
|
}
|
|
|
|
|
}
|
2021-08-04 13:11:51 +00:00
|
|
|
}
|
|
|
|
|
if len(errs) > 0 {
|
|
|
|
|
keyvals = append(keyvals, "err", errs)
|
|
|
|
|
}
|
|
|
|
|
if len(internalErrs) > 0 {
|
|
|
|
|
keyvals = append(keyvals, "internal", internalErrs)
|
|
|
|
|
}
|
Add UUID to Fleet errors and clean up error msgs (#10411)
#8129
Apart from fixing the issue in #8129, this change also introduces UUIDs
to Fleet errors. To be able to match a returned error from the API to a
error in the Fleet logs. See
https://fleetdm.slack.com/archives/C019WG4GH0A/p1677780622769939 for
more context.
Samples with the changes in this PR:
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d ''
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "Expected JSON Body"
}
],
"uuid": "a01f6e10-354c-4ff0-b96e-1f64adb500b0"
}
```
```
curl -k -H "Authorization: Bearer $TEST_TOKEN" -H 'Content-Type:application/json' "https://localhost:8080/api/v1/fleet/sso" -d 'asd'
{
"message": "Bad request",
"errors": [
{
"name": "base",
"reason": "json decoder error"
}
],
"uuid": "5f716a64-7550-464b-a1dd-e6a505a9f89d"
}
```
```
curl -k -X GET -H "Authorization: Bearer badtoken" "https://localhost:8080/api/latest/fleet/teams"
{
"message": "Authentication required",
"errors": [
{
"name": "base",
"reason": "Authentication required"
}
],
"uuid": "efe45bc0-f956-4bf9-ba4f-aa9020a9aaaf"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Authorization header required",
"errors": [
{
"name": "base",
"reason": "Authorization header required"
}
],
"uuid": "57f78cd0-4559-464f-9df7-36c9ef7c89b3"
}
```
```
curl -k -X PATCH -H "Authorization: Bearer $TEST_TOKEN" "https://localhost:8080/api/latest/fleet/users/14" -d '{"name": "Manuel2", "password": "what", "new_password": "p4ssw0rd.12345"}'
{
"message": "Permission Denied",
"uuid": "7f0220ad-6de7-4faf-8b6c-8d7ff9d2ca06"
}
```
- [X] Changes file added for user-visible changes in `changes/` or
`orbit/changes/`.
See [Changes
files](https://fleetdm.com/docs/contributing/committing-changes#changes-files)
for more information.
- [X] Documented any API changes (docs/Using-Fleet/REST-API.md or
docs/Contributing/API-for-contributors.md)
- ~[ ] Documented any permissions changes~
- ~[ ] Input data is properly validated, `SELECT *` is avoided, SQL
injection is prevented (using placeholders for values in statements)~
- ~[ ] Added support on fleet's osquery simulator `cmd/osquery-perf` for
new osquery data ingestion features.~
- [X] Added/updated tests
- [X] Manual QA for all new/changed functionality
- For Orbit and Fleet Desktop changes:
- [X] Manual QA must be performed in the three main OSs, macOS, Windows
and Linux.
- ~[ ] Auto-update manual QA, from released version of component to new
version (see [tools/tuf/test](../tools/tuf/test/README.md)).~
2023-03-13 16:44:06 +00:00
|
|
|
if len(uuids) > 0 {
|
|
|
|
|
keyvals = append(keyvals, "uuid", strings.Join(uuids, ","))
|
|
|
|
|
}
|
2021-08-04 13:11:51 +00:00
|
|
|
}
|
|
|
|
|
|
2021-08-02 22:06:27 +00:00
|
|
|
_ = logger.Log(keyvals...)
|
|
|
|
|
}
|