4 Commits

Author SHA1 Message Date
54174ef418 added a bit of zap logging
Some checks failed
Build and Push Docker Image / Build image (push) Failing after 58s
2025-04-09 20:03:34 +03:00
29d13371a8 made it so no documents is not an error in get
Some checks failed
Build and Push Docker Image / Build image (push) Has been cancelled
2025-04-09 17:48:52 +03:00
b71bf21b48 fixed
Some checks failed
Build and Push Docker Image / Build image (push) Failing after 2m59s
2025-04-09 17:41:08 +03:00
ae12746ff2 added file browser to auth verify, setting up from clients
Some checks failed
Build and Push Docker Image / Build image (push) Has been cancelled
2025-04-09 17:34:27 +03:00
12 changed files with 130 additions and 67 deletions

View File

@@ -6,11 +6,11 @@ import (
"fmt" "fmt"
"log" "log"
"net/http" "net/http"
"strings"
"time" "time"
"git.acooldomain.co/server-manager/backend/dbhandler" "git.acooldomain.co/server-manager/backend/dbhandler"
"git.acooldomain.co/server-manager/backend/factories" "git.acooldomain.co/server-manager/backend/factories"
"git.acooldomain.co/server-manager/backend/instancemanager"
"git.acooldomain.co/server-manager/backend/models" "git.acooldomain.co/server-manager/backend/models"
"github.com/gin-gonic/gin" "github.com/gin-gonic/gin"
"github.com/golang-jwt/jwt" "github.com/golang-jwt/jwt"
@@ -19,6 +19,7 @@ import (
type AuthApi struct { type AuthApi struct {
config models.GlobalConfig config models.GlobalConfig
instanceManager instancemanager.InstanceManager
tokenHandler dbhandler.InviteTokenDbHandler tokenHandler dbhandler.InviteTokenDbHandler
userAuthDbHandler dbhandler.UserPassAuthanticationDbHandler userAuthDbHandler dbhandler.UserPassAuthanticationDbHandler
serverAuthDbHandler dbhandler.ServersAuthorizationDbHandler serverAuthDbHandler dbhandler.ServersAuthorizationDbHandler
@@ -115,6 +116,11 @@ func (con AuthApi) signUp(ctx *gin.Context) {
return return
} }
err = con.tokenHandler.DeleteInviteToken(ctx, token.Token)
if err != nil {
log.Printf("Failed to delete token %s", err)
}
con.signIn(ctx) con.signIn(ctx)
} }
@@ -169,31 +175,23 @@ func (con AuthApi) Verify(ctx *gin.Context) {
forwardedUri := ctx.Request.Header.Get("x-forwarded-uri") forwardedUri := ctx.Request.Header.Get("x-forwarded-uri")
pathSegments := strings.Split(forwardedUri, "/") fileBrowser, err := con.instanceManager.GetFileBrowserFromUrl(ctx, forwardedUri)
if err != nil {
ctx.AbortWithError(500, err)
return
}
serverId, service := pathSegments[2], pathSegments[1] fmt.Printf("%#v %s", claims, fileBrowser.ServerId)
serverPermissions, err := con.serverAuthDbHandler.GetPermissions(ctx, claims.Username, fileBrowser.ServerId)
switch service { if err != nil {
case "browsers": ctx.AbortWithError(500, err)
fmt.Printf("%#v %s", claims, serverId) return
serverPermissions, err := con.serverAuthDbHandler.GetPermissions(ctx, claims.Username, serverId) }
if err != nil { if (claims.Permissions|serverPermissions)&models.Admin == models.Admin {
ctx.AbortWithError(500, err) ctx.Header("X-Auth-Username", claims.Username)
return log.Printf("Set header X-Username %s", claims.Username)
} ctx.Status(200)
if (claims.Permissions|serverPermissions)&models.Admin == models.Admin { return
ctx.Header("X-Auth-Username", claims.Username)
log.Printf("Set header X-Username %s", claims.Username)
ctx.Status(200)
return
}
case "cloud":
if claims.Permissions&models.Cloud == models.Cloud || claims.Permissions&models.Admin == models.Admin {
log.Printf("Set header X-Username %s", claims.Username)
ctx.Header("X-Auth-Username", claims.Username)
ctx.Status(200)
return
}
} }
ctx.Redirect(303, fmt.Sprintf("http://%s/login", con.config.Domain)) ctx.Redirect(303, fmt.Sprintf("http://%s/login", con.config.Domain))
@@ -210,6 +208,11 @@ func LoadGroup(group *gin.RouterGroup, config models.GlobalConfig) gin.HandlerFu
panic(err) panic(err)
} }
instanceManager, err := factories.GetInstanceManager(config.InstanceManager, config.Domain)
if err != nil {
panic(err)
}
inviteHandler, err := factories.GetInviteTokenDbHandler(config.Authentication.UserPass.InviteTokenDatabase) inviteHandler, err := factories.GetInviteTokenDbHandler(config.Authentication.UserPass.InviteTokenDatabase)
if err != nil { if err != nil {
panic(err) panic(err)
@@ -218,6 +221,7 @@ func LoadGroup(group *gin.RouterGroup, config models.GlobalConfig) gin.HandlerFu
connection := AuthApi{ connection := AuthApi{
userAuthDbHandler: userAuthHandler, userAuthDbHandler: userAuthHandler,
serverAuthDbHandler: serverAuthDbHandler, serverAuthDbHandler: serverAuthDbHandler,
instanceManager: instanceManager,
tokenHandler: inviteHandler, tokenHandler: inviteHandler,
config: config, config: config,
} }

View File

@@ -13,7 +13,7 @@ func AuthorizedTo(requiredPermissions models.Permission) gin.HandlerFunc {
return func(ctx *gin.Context) { return func(ctx *gin.Context) {
claimsPointer, exists := ctx.Get("claims") claimsPointer, exists := ctx.Get("claims")
if !exists { if !exists {
ctx.AbortWithError(500, fmt.Errorf("Did not call LoggedIn first")) ctx.AbortWithError(500, fmt.Errorf("did not call LoggedIn first"))
return return
} }
@@ -41,6 +41,5 @@ func AuthorizationEnforcer() gin.HandlerFunc {
if !authorized.(bool) { if !authorized.(bool) {
ctx.AbortWithStatus(403) ctx.AbortWithStatus(403)
} }
} }
} }

View File

@@ -21,8 +21,8 @@ type ServersAuthorizationDbHandler struct {
collection *mongo.Collection collection *mongo.Collection
} }
func (self *ServersAuthorizationDbHandler) RemoveUser(ctx context.Context, username string) error { func (sa *ServersAuthorizationDbHandler) RemoveUser(ctx context.Context, username string) error {
_, err := self.collection.DeleteMany( _, err := sa.collection.DeleteMany(
ctx, ctx,
bson.M{ bson.M{
"username": username, "username": username,
@@ -32,8 +32,8 @@ func (self *ServersAuthorizationDbHandler) RemoveUser(ctx context.Context, usern
return err return err
} }
func (self *ServersAuthorizationDbHandler) RemoveServer(ctx context.Context, serverId string) error { func (sa *ServersAuthorizationDbHandler) RemoveServer(ctx context.Context, serverId string) error {
_, err := self.collection.DeleteMany( _, err := sa.collection.DeleteMany(
ctx, ctx,
bson.M{ bson.M{
"server_id": serverId, "server_id": serverId,
@@ -43,33 +43,33 @@ func (self *ServersAuthorizationDbHandler) RemoveServer(ctx context.Context, ser
return err return err
} }
func (self *ServersAuthorizationDbHandler) AddPermissions(ctx context.Context, username string, serverId string, permissions models.Permission) error { func (sa *ServersAuthorizationDbHandler) AddPermissions(ctx context.Context, username string, serverId string, permissions models.Permission) error {
var serverPermissions ServerPermissions var serverPermissions ServerPermissions
err := self.collection.FindOne( err := sa.collection.FindOne(
ctx, ctx,
bson.M{ bson.M{
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
).Decode(&serverPermissions) ).Decode(&serverPermissions)
if err != nil { if err != nil {
return err return err
} }
newPermissions := serverPermissions.Permissions | permissions newPermissions := serverPermissions.Permissions | permissions
_, err = self.collection.UpdateOne( _, err = sa.collection.UpdateOne(
ctx, ctx,
bson.M{ bson.M{
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
bson.M{"$set": bson.M{ bson.M{
"username": username, "$set": bson.M{
"server_id": serverId, "username": username,
"permissions": newPermissions, "server_id": serverId,
}, "permissions": newPermissions,
},
}, },
options.Update().SetUpsert(true), options.Update().SetUpsert(true),
) )
@@ -77,65 +77,68 @@ func (self *ServersAuthorizationDbHandler) AddPermissions(ctx context.Context, u
return err return err
} }
func (self *ServersAuthorizationDbHandler) RemovePermissions(ctx context.Context, username string, serverId string, permissions models.Permission) error { func (sa *ServersAuthorizationDbHandler) RemovePermissions(ctx context.Context, username string, serverId string, permissions models.Permission) error {
var serverPermissions ServerPermissions var serverPermissions ServerPermissions
err := self.collection.FindOne( err := sa.collection.FindOne(
ctx, ctx,
bson.M{ bson.M{
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
).Decode(&serverPermissions) ).Decode(&serverPermissions)
if err != nil { if err != nil {
return err return err
} }
newPermissions := serverPermissions.Permissions | permissions ^ permissions newPermissions := serverPermissions.Permissions | permissions ^ permissions
_, err = self.collection.UpdateOne( _, err = sa.collection.UpdateOne(
ctx, ctx,
bson.M{ bson.M{
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
bson.M{"$set": bson.M{ bson.M{
"permissions": newPermissions, "$set": bson.M{
}, "permissions": newPermissions,
},
}, },
) )
return err return err
} }
func (self *ServersAuthorizationDbHandler) SetPermissions(ctx context.Context, username string, serverId string, permissions models.Permission) error { func (sa *ServersAuthorizationDbHandler) SetPermissions(ctx context.Context, username string, serverId string, permissions models.Permission) error {
_, err := self.collection.UpdateOne( _, err := sa.collection.UpdateOne(
ctx, ctx,
bson.M{ bson.M{
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
bson.M{"$set": bson.M{ bson.M{
"permissions": permissions, "$set": bson.M{
}, "permissions": permissions,
},
}, },
) )
return err return err
} }
func (self *ServersAuthorizationDbHandler) GetPermissions(ctx context.Context, username string, serverId string) (models.Permission, error) { func (sa *ServersAuthorizationDbHandler) GetPermissions(ctx context.Context, username string, serverId string) (models.Permission, error) {
var serverPermissions ServerPermissions var serverPermissions ServerPermissions
err := self.collection.FindOne( err := sa.collection.FindOne(
ctx, ctx,
bson.M{ bson.M{
"username": username, "username": username,
"server_id": serverId, "server_id": serverId,
}, },
).Decode(&serverPermissions) ).Decode(&serverPermissions)
if err != nil { if err != nil {
if err == mongo.ErrNoDocuments {
return 0, nil
}
return 0, err return 0, err
} }

View File

@@ -170,6 +170,11 @@ func (i *InviteTokenDbHandler) SaveInviteToken(ctx context.Context, email string
return token, nil return token, nil
} }
func (i *InviteTokenDbHandler) DeleteInviteToken(ctx context.Context, token string) error {
_, err := i.collection.DeleteOne(ctx, bson.M{"token": token})
return err
}
func (i *InviteTokenDbHandler) GetInviteToken(ctx context.Context, token string) (*dbhandler.InviteToken, error) { func (i *InviteTokenDbHandler) GetInviteToken(ctx context.Context, token string) (*dbhandler.InviteToken, error) {
var inviteToken InviteToken var inviteToken InviteToken
err := i.collection.FindOne(ctx, bson.M{"token": token}).Decode(&inviteToken) err := i.collection.FindOne(ctx, bson.M{"token": token}).Decode(&inviteToken)

View File

@@ -40,4 +40,5 @@ type UserPassAuthanticationDbHandler interface {
type InviteTokenDbHandler interface { type InviteTokenDbHandler interface {
SaveInviteToken(ctx context.Context, email string, permissions models.Permission) (string, error) SaveInviteToken(ctx context.Context, email string, permissions models.Permission) (string, error)
GetInviteToken(ctx context.Context, token string) (*InviteToken, error) GetInviteToken(ctx context.Context, token string) (*InviteToken, error)
DeleteInviteToken(ctx context.Context, token string) error
} }

2
go.mod
View File

@@ -60,6 +60,8 @@ require (
go.opentelemetry.io/otel/metric v1.35.0 // indirect go.opentelemetry.io/otel/metric v1.35.0 // indirect
go.opentelemetry.io/otel/sdk v1.35.0 // indirect go.opentelemetry.io/otel/sdk v1.35.0 // indirect
go.opentelemetry.io/otel/trace v1.35.0 // indirect go.opentelemetry.io/otel/trace v1.35.0 // indirect
go.uber.org/multierr v1.11.0 // indirect
go.uber.org/zap v1.27.0 // indirect
golang.org/x/oauth2 v0.28.0 // indirect golang.org/x/oauth2 v0.28.0 // indirect
golang.org/x/sync v0.11.0 // indirect golang.org/x/sync v0.11.0 // indirect
golang.org/x/time v0.11.0 // indirect golang.org/x/time v0.11.0 // indirect

4
go.sum
View File

@@ -196,6 +196,10 @@ go.opentelemetry.io/otel/trace v1.35.0 h1:dPpEfJu1sDIqruz7BHFG3c7528f6ddfSWfFDVt
go.opentelemetry.io/otel/trace v1.35.0/go.mod h1:WUk7DtFp1Aw2MkvqGdwiXYDZZNvA/1J8o6xRXLrIkyc= go.opentelemetry.io/otel/trace v1.35.0/go.mod h1:WUk7DtFp1Aw2MkvqGdwiXYDZZNvA/1J8o6xRXLrIkyc=
go.opentelemetry.io/proto/otlp v1.5.0 h1:xJvq7gMzB31/d406fB8U5CBdyQGw4P399D1aQWU/3i4= go.opentelemetry.io/proto/otlp v1.5.0 h1:xJvq7gMzB31/d406fB8U5CBdyQGw4P399D1aQWU/3i4=
go.opentelemetry.io/proto/otlp v1.5.0/go.mod h1:keN8WnHxOy8PG0rQZjJJ5A2ebUoafqWp0eVQ4yIXvJ4= go.opentelemetry.io/proto/otlp v1.5.0/go.mod h1:keN8WnHxOy8PG0rQZjJJ5A2ebUoafqWp0eVQ4yIXvJ4=
go.uber.org/multierr v1.11.0 h1:blXXJkSxSSfBVBlC76pxqeO+LN3aDfLQo+309xJstO0=
go.uber.org/multierr v1.11.0/go.mod h1:20+QtiLqy0Nd6FdQB9TLXag12DsQkrbs3htMFfDN80Y=
go.uber.org/zap v1.27.0 h1:aJMhYGrd5QSmlpLMr2MftRKl7t8J8PTZPA732ud/XR8=
go.uber.org/zap v1.27.0/go.mod h1:GB2qFLM7cTU87MWRP2mPIjqfIDnGu+VIO4V/SdhGo2E=
golang.org/x/arch v0.0.0-20210923205945-b76863e36670/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8= golang.org/x/arch v0.0.0-20210923205945-b76863e36670/go.mod h1:5om86z9Hs0C8fWVUuoMHwpExlXzs5Tkyp9hOrfG7pp8=
golang.org/x/arch v0.8.0 h1:3wRIsP3pM4yUptoR96otTUOXI367OS0+c9eeRi9doIc= golang.org/x/arch v0.8.0 h1:3wRIsP3pM4yUptoR96otTUOXI367OS0+c9eeRi9doIc=
golang.org/x/arch v0.8.0/go.mod h1:FEVrYAQjsQXMVJ1nsMoVVXPZg6p2JE2mx8psSWTDQys= golang.org/x/arch v0.8.0/go.mod h1:FEVrYAQjsQXMVJ1nsMoVVXPZg6p2JE2mx8psSWTDQys=

View File

@@ -656,6 +656,10 @@ func (im *InstanceManager) StopFileBrowser(ctx context.Context, serverId string)
return nil return nil
} }
func (im *InstanceManager) GetFileBrowserFromUrl(ctx context.Context, url string) (*models.FileBrowser, error) {
return im.GetFileBrowser(ctx, strings.Split(url, "/")[1])
}
func NewInstanceManager(config models.DockerInstanceManagerConfig, siteDomain string) (*InstanceManager, error) { func NewInstanceManager(config models.DockerInstanceManagerConfig, siteDomain string) (*InstanceManager, error) {
apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithAPIVersionNegotiation()) apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithAPIVersionNegotiation())
if err != nil { if err != nil {

View File

@@ -59,6 +59,7 @@ type InstanceManager interface {
// Read Only // Read Only
GetFileBrowser(ctx context.Context, serverId string) (*models.FileBrowser, error) GetFileBrowser(ctx context.Context, serverId string) (*models.FileBrowser, error)
GetFileBrowserFromUrl(ctx context.Context, url string) (*models.FileBrowser, error)
ListFileBrowsers(ctx context.Context) ([]models.FileBrowser, error) ListFileBrowsers(ctx context.Context) ([]models.FileBrowser, error)
// Status Changing // Status Changing

View File

@@ -299,6 +299,18 @@ func (i *InstanceManager) GetFileBrowser(ctx context.Context, serverId string) (
return &models.FileBrowser{ServerId: serverManager.Name, Id: serverManager.Name, Url: serverManager.Status.Browser.Url}, nil return &models.FileBrowser{ServerId: serverManager.Name, Id: serverManager.Name, Url: serverManager.Status.Browser.Url}, nil
} }
func (i *InstanceManager) GetFileBrowserFromUrl(ctx context.Context, url string) (*models.FileBrowser, error) {
serverManager := &servermanagerv1.ServerManager{}
urlSegments := strings.Split(url, "/")
namespace, serverId := urlSegments[2], urlSegments[3]
err := i.client.Get(ctx, client.ObjectKey{Namespace: namespace, Name: serverId}, serverManager)
if err != nil {
return nil, err
}
return &models.FileBrowser{ServerId: serverManager.Name, Id: serverManager.Name, Url: serverManager.Status.Browser.Url}, nil
}
func (i *InstanceManager) ListFileBrowsers(ctx context.Context) ([]models.FileBrowser, error) { func (i *InstanceManager) ListFileBrowsers(ctx context.Context) ([]models.FileBrowser, error) {
serverManagers := &servermanagerv1.ServerManagerList{} serverManagers := &servermanagerv1.ServerManagerList{}
err := i.client.List(ctx, serverManagers, &client.ListOptions{Namespace: i.Config.Namespace}) err := i.client.List(ctx, serverManagers, &client.ListOptions{Namespace: i.Config.Namespace})

26
logger/logger.go Normal file
View File

@@ -0,0 +1,26 @@
package logger
import (
"os"
"go.uber.org/zap"
"go.uber.org/zap/zapcore"
)
var Logger *zap.Logger
func init() {
var cfg zap.Config
if os.Getenv("DEBUG") == "true" {
cfg = zap.NewDevelopmentConfig()
} else {
cfg = zap.NewProductionConfig()
}
cfg.EncoderConfig.EncodeTime = zapcore.ISO8601TimeEncoder
var err error
Logger, err = cfg.Build()
if err != nil {
panic(err)
}
defer Logger.Sync() // flushes buffer, if any
}

View File

@@ -2,9 +2,7 @@ package servers
import ( import (
"encoding/json" "encoding/json"
"errors"
"fmt" "fmt"
"log"
"net/http" "net/http"
"strconv" "strconv"
"strings" "strings"
@@ -14,9 +12,11 @@ import (
"git.acooldomain.co/server-manager/backend/dbhandler" "git.acooldomain.co/server-manager/backend/dbhandler"
"git.acooldomain.co/server-manager/backend/factories" "git.acooldomain.co/server-manager/backend/factories"
instancemanager "git.acooldomain.co/server-manager/backend/instancemanager" instancemanager "git.acooldomain.co/server-manager/backend/instancemanager"
"git.acooldomain.co/server-manager/backend/logger"
"git.acooldomain.co/server-manager/backend/models" "git.acooldomain.co/server-manager/backend/models"
"github.com/gin-gonic/gin" "github.com/gin-gonic/gin"
"github.com/gorilla/websocket" "github.com/gorilla/websocket"
"go.uber.org/zap"
) )
var upgrader = websocket.Upgrader{ var upgrader = websocket.Upgrader{
@@ -193,16 +193,12 @@ func (con ServersApi) GetServers(ctx *gin.Context) {
server := serverConfigsMap[instanceServer.Id] server := serverConfigsMap[instanceServer.Id]
var image ImageInfo var image ImageInfo
log.Printf("server=%#v\t|\tinstanceServer=%#v", server, instanceServer)
if instanceServer.Running { if instanceServer.Running {
image = ImageInfo{ image = ImageInfo{
Name: instanceServer.RunningImage.Registry, Name: instanceServer.RunningImage.Registry,
Version: instanceServer.RunningImage.Tag, Version: instanceServer.RunningImage.Tag,
} }
} else { } else {
log.Printf("serverImage:%#v", server.Image)
image = ImageInfo{ image = ImageInfo{
Name: server.Image.Registry, Name: server.Image.Registry,
Version: server.Image.Tag, Version: server.Image.Tag,
@@ -246,6 +242,7 @@ func (con ServersApi) DeleteServer(ctx *gin.Context) {
err = con.ServersDbHandler.DeleteServer(ctx, serverId) err = con.ServersDbHandler.DeleteServer(ctx, serverId)
if err != nil { if err != nil {
logger.Logger.Error("Failed to delete server", zap.String("ServerId", serverId), zap.Error(err))
ctx.AbortWithError(501, err) ctx.AbortWithError(501, err)
return return
} }
@@ -262,13 +259,15 @@ func (con ServersApi) RunCommand(ctx *gin.Context) {
err := json.NewDecoder(ctx.Request.Body).Decode(&request) err := json.NewDecoder(ctx.Request.Body).Decode(&request)
if err != nil { if err != nil {
ctx.AbortWithError(500, err) ctx.AbortWithError(500, err)
return
} }
serverId := ctx.Param("server_id") serverId := ctx.Param("server_id")
log.Print("Writing command \"", request.Command, "\"") logger.Logger.Info("Writing command", zap.String("ServerId", serverId), zap.String("Command", request.Command))
consolePointer, err := con.InstanceManager.InteractiveTerminal(ctx, serverId) consolePointer, err := con.InstanceManager.InteractiveTerminal(ctx, serverId)
if err != nil { if err != nil {
logger.Logger.Error("Failed getting terminal", zap.String("ServerId", serverId), zap.String("Command", request.Command), zap.Error(err))
ctx.AbortWithError(500, err) ctx.AbortWithError(500, err)
return return
} }
@@ -278,10 +277,12 @@ func (con ServersApi) RunCommand(ctx *gin.Context) {
_, err = console.Conn.Write([]byte(request.Command + "\n")) _, err = console.Conn.Write([]byte(request.Command + "\n"))
if err != nil { if err != nil {
logger.Logger.Error("Failed writing command", zap.String("ServerId", serverId), zap.String("Command", request.Command), zap.Error(err))
ctx.AbortWithError(500, err) ctx.AbortWithError(500, err)
return return
} }
logger.Logger.Info("Successfully wrote command", zap.String("ServerId", serverId), zap.String("Command", request.Command))
ctx.JSON(200, "OK") ctx.JSON(200, "OK")
} }
@@ -301,8 +302,9 @@ func (con ServersApi) AttachServer(ctx *gin.Context) {
defer func() { defer func() {
if err != nil { if err != nil {
log.Printf("The latest error is %s", err) logger.Logger.Error("Interactive Terminal latest error", zap.Error(err))
} }
close(websocketRead) close(websocketRead)
close(containerRead) close(containerRead)
}() }()
@@ -375,7 +377,7 @@ func (con ServersApi) AttachServer(ctx *gin.Context) {
case "insert": case "insert":
_, err = hijacked.Conn.Write([]byte(Command.Arguments)) _, err = hijacked.Conn.Write([]byte(Command.Arguments))
if err != nil { if err != nil {
log.Printf("Write to docker failed %s", errors.Unwrap(err)) logger.Logger.Error("Write to docker failed", zap.Error(err))
stop = true stop = true
break break
@@ -400,13 +402,13 @@ func (con ServersApi) AttachServer(ctx *gin.Context) {
err2 = hijacked.ResizerFunc(width, height) err2 = hijacked.ResizerFunc(width, height)
if err2 != nil { if err2 != nil {
log.Printf("Failed to resize container to %dx%d: %s", width, height, err) logger.Logger.Error("Failed to resize container", zap.Uint("width", width), zap.Uint("height", height), zap.Error(err))
} }
} }
case data := <-containerRead: case data := <-containerRead:
err := ws.WriteJSON(data) err := ws.WriteJSON(data)
if err != nil { if err != nil {
log.Printf("Write to socket failed %s", errors.Unwrap(err)) logger.Logger.Error("Write to socket failed", zap.Error(err))
stop = true stop = true
} }
} }
@@ -442,7 +444,7 @@ func (con ServersApi) UpdateServer(ctx *gin.Context) {
for user, permissions := range request.UserPermissions { for user, permissions := range request.UserPermissions {
err = con.ServerAuthorization.SetPermissions(ctx, user, serverId, permissions) err = con.ServerAuthorization.SetPermissions(ctx, user, serverId, permissions)
if err != nil { if err != nil {
log.Printf("failed to change user %s permissions for server %s due to %e", user, serverId, err) logger.Logger.Error("failed to change user's server permissions", zap.String("user", user), zap.String("ServerId", serverId), zap.Error(err))
continue continue
} }
} }