diff options
author | zeripath <art27@cantab.net> | 2019-04-02 08:48:31 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2019-04-02 08:48:31 +0100 |
commit | 704da08fdc6bae6fdd6bf1b892ebe12afeef5eca (patch) | |
tree | e0613ab3ba0d4336b0912bbad8862f503ec180f6 /cmd | |
parent | ef2a343e27d8af2de0bb696bd60d9a019e1e8b69 (diff) | |
download | gitea-704da08fdc6bae6fdd6bf1b892ebe12afeef5eca.tar.gz gitea-704da08fdc6bae6fdd6bf1b892ebe12afeef5eca.zip |
Better logging (#6038) (#6095)
* Panic don't fatal on create new logger
Fixes #5854
Signed-off-by: Andrew Thornton <art27@cantab.net>
* partial broken
* Update the logging infrastrcture
Signed-off-by: Andrew Thornton <art27@cantab.net>
* Reset the skip levels for Fatal and Error
Signed-off-by: Andrew Thornton <art27@cantab.net>
* broken ncsa
* More log.Error fixes
Signed-off-by: Andrew Thornton <art27@cantab.net>
* Remove nal
* set log-levels to lowercase
* Make console_test test all levels
* switch to lowercased levels
* OK now working
* Fix vetting issues
* Fix lint
* Fix tests
* change default logging to match current gitea
* Improve log testing
Signed-off-by: Andrew Thornton <art27@cantab.net>
* reset error skip levels to 0
* Update documentation and access logger configuration
* Redirect the router log back to gitea if redirect macaron log but also allow setting the log level - i.e. TRACE
* Fix broken level caching
* Refactor the router log
* Add Router logger
* Add colorizing options
* Adjust router colors
* Only create logger if they will be used
* update app.ini.sample
* rename Attribute ColorAttribute
* Change from white to green for function
* Set fatal/error levels
* Restore initial trace logger
* Fix Trace arguments in modules/auth/auth.go
* Properly handle XORMLogger
* Improve admin/config page
* fix fmt
* Add auto-compression of old logs
* Update error log levels
* Remove the unnecessary skip argument from Error, Fatal and Critical
* Add stacktrace support
* Fix tests
* Remove x/sync from vendors?
* Add stderr option to console logger
* Use filepath.ToSlash to protect against Windows in tests
* Remove prefixed underscores from names in colors.go
* Remove not implemented database logger
This was removed from Gogs on 4 Mar 2016 but left in the configuration
since then.
* Ensure that log paths are relative to ROOT_PATH
* use path.Join
* rename jsonConfig to logConfig
* Rename "config" to "jsonConfig" to make it clearer
* Requested changes
* Requested changes: XormLogger
* Try to color the windows terminal
If successful default to colorizing the console logs
* fixup
* Colorize initially too
* update vendor
* Colorize logs on default and remove if this is not a colorizing logger
* Fix documentation
* fix test
* Use go-isatty to detect if on windows we are on msys or cygwin
* Fix spelling mistake
* Add missing vendors
* More changes
* Rationalise the ANSI writer protection
* Adjust colors on advice from @0x5c
* Make Flags a comma separated list
* Move to use the windows constant for ENABLE_VIRTUAL_TERMINAL_PROCESSING
* Ensure matching is done on the non-colored message - to simpify EXPRESSION
Diffstat (limited to 'cmd')
-rw-r--r-- | cmd/hook.go | 6 | ||||
-rw-r--r-- | cmd/migrate.go | 2 | ||||
-rw-r--r-- | cmd/serv.go | 2 | ||||
-rw-r--r-- | cmd/web.go | 14 | ||||
-rw-r--r-- | cmd/web_graceful.go | 2 |
5 files changed, 13 insertions, 13 deletions
diff --git a/cmd/hook.go b/cmd/hook.go index 18d26f17ca..88e61c61d1 100644 --- a/cmd/hook.go +++ b/cmd/hook.go @@ -204,14 +204,14 @@ func runHookPostReceive(c *cli.Context) error { RepoUserName: repoUser, RepoName: repoName, }); err != nil { - log.GitLogger.Error(2, "Update: %v", err) + log.GitLogger.Error("Update: %v", err) } if newCommitID != git.EmptySHA && strings.HasPrefix(refFullName, git.BranchPrefix) { branch := strings.TrimPrefix(refFullName, git.BranchPrefix) repo, pullRequestAllowed, err := private.GetRepository(repoID) if err != nil { - log.GitLogger.Error(2, "get repo: %v", err) + log.GitLogger.Error("get repo: %v", err) break } if !pullRequestAllowed { @@ -229,7 +229,7 @@ func runHookPostReceive(c *cli.Context) error { pr, err := private.ActivePullRequest(baseRepo.ID, repo.ID, baseRepo.DefaultBranch, branch) if err != nil { - log.GitLogger.Error(2, "get active pr: %v", err) + log.GitLogger.Error("get active pr: %v", err) break } diff --git a/cmd/migrate.go b/cmd/migrate.go index d5dd3068cf..3e6bf907a4 100644 --- a/cmd/migrate.go +++ b/cmd/migrate.go @@ -44,7 +44,7 @@ func runMigrate(ctx *cli.Context) error { models.LoadConfigs() if err := models.NewEngine(migrations.Migrate); err != nil { - log.Fatal(4, "Failed to initialize ORM engine: %v", err) + log.Fatal("Failed to initialize ORM engine: %v", err) return err } diff --git a/cmd/serv.go b/cmd/serv.go index cab72f911b..ebd71ad3c7 100644 --- a/cmd/serv.go +++ b/cmd/serv.go @@ -100,7 +100,7 @@ func fail(userMessage, logMessage string, args ...interface{}) { if !setting.ProdMode { fmt.Fprintf(os.Stderr, logMessage+"\n", args...) } - log.GitLogger.Fatal(3, logMessage, args...) + log.GitLogger.Fatal(logMessage, args...) return } diff --git a/cmd/web.go b/cmd/web.go index 8fed559ff5..4641645ee4 100644 --- a/cmd/web.go +++ b/cmd/web.go @@ -69,7 +69,7 @@ func runHTTPRedirector() { var err = runHTTP(source, context2.ClearHandler(handler)) if err != nil { - log.Fatal(4, "Failed to start port redirection: %v", err) + log.Fatal("Failed to start port redirection: %v", err) } } @@ -84,7 +84,7 @@ func runLetsEncrypt(listenAddr, domain, directory, email string, m http.Handler) log.Info("Running Let's Encrypt handler on %s", setting.HTTPAddr+":"+setting.PortToRedirect) var err = http.ListenAndServe(setting.HTTPAddr+":"+setting.PortToRedirect, certManager.HTTPHandler(http.HandlerFunc(runLetsEncryptFallbackHandler))) // all traffic coming into HTTP will be redirect to HTTPS automatically (LE HTTP-01 validation happens here) if err != nil { - log.Fatal(4, "Failed to start the Let's Encrypt handler on port %s: %v", setting.PortToRedirect, err) + log.Fatal("Failed to start the Let's Encrypt handler on port %s: %v", setting.PortToRedirect, err) } }() server := &http.Server{ @@ -192,13 +192,13 @@ func runWeb(ctx *cli.Context) error { case setting.FCGI: listener, err := net.Listen("tcp", listenAddr) if err != nil { - log.Fatal(4, "Failed to bind %s", listenAddr, err) + log.Fatal("Failed to bind %s: %v", listenAddr, err) } defer listener.Close() err = fcgi.Serve(listener, context2.ClearHandler(m)) case setting.UnixSocket: if err := os.Remove(listenAddr); err != nil && !os.IsNotExist(err) { - log.Fatal(4, "Failed to remove unix socket directory %s: %v", listenAddr, err) + log.Fatal("Failed to remove unix socket directory %s: %v", listenAddr, err) } var listener *net.UnixListener listener, err = net.ListenUnix("unix", &net.UnixAddr{Name: listenAddr, Net: "unix"}) @@ -209,15 +209,15 @@ func runWeb(ctx *cli.Context) error { // FIXME: add proper implementation of signal capture on all protocols // execute this on SIGTERM or SIGINT: listener.Close() if err = os.Chmod(listenAddr, os.FileMode(setting.UnixSocketPermission)); err != nil { - log.Fatal(4, "Failed to set permission of unix socket: %v", err) + log.Fatal("Failed to set permission of unix socket: %v", err) } err = http.Serve(listener, context2.ClearHandler(m)) default: - log.Fatal(4, "Invalid protocol: %s", setting.Protocol) + log.Fatal("Invalid protocol: %s", setting.Protocol) } if err != nil { - log.Fatal(4, "Failed to start server: %v", err) + log.Fatal("Failed to start server: %v", err) } return nil diff --git a/cmd/web_graceful.go b/cmd/web_graceful.go index e54561f163..53f407ce9e 100644 --- a/cmd/web_graceful.go +++ b/cmd/web_graceful.go @@ -34,7 +34,7 @@ func runHTTPS(listenAddr, certFile, keyFile string, m http.Handler) error { var err error config.Certificates[0], err = tls.LoadX509KeyPair(certFile, keyFile) if err != nil { - log.Fatal(4, "Failed to load https cert file %s: %v", listenAddr, err) + log.Fatal("Failed to load https cert file %s: %v", listenAddr, err) } return gracehttp.Serve(&http.Server{ |