Skip to content

Commit 83f8301

Browse files
wxiaoguangGiteaBot
andauthored
Clean up log messages (#30313)
`log.Xxx("%v")` is not ideal, this PR adds necessary context messages. Remove some unnecessary logs. Co-authored-by: Giteabot <[email protected]>
1 parent 94aad35 commit 83f8301

File tree

17 files changed

+31
-47
lines changed

17 files changed

+31
-47
lines changed

cmd/web.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ func showWebStartupMessage(msg string) {
114114
log.Info("* WorkPath: %s", setting.AppWorkPath)
115115
log.Info("* CustomPath: %s", setting.CustomPath)
116116
log.Info("* ConfigFile: %s", setting.CustomConf)
117-
log.Info("%s", msg)
117+
log.Info("%s", msg) // show startup message
118118
}
119119

120120
func serveInstall(ctx *cli.Context) error {

models/asymkey/ssh_key_fingerprint.go

Lines changed: 4 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -76,23 +76,14 @@ func calcFingerprintNative(publicKeyContent string) (string, error) {
7676
// CalcFingerprint calculate public key's fingerprint
7777
func CalcFingerprint(publicKeyContent string) (string, error) {
7878
// Call the method based on configuration
79-
var (
80-
fnName, fp string
81-
err error
82-
)
83-
if len(setting.SSH.KeygenPath) == 0 {
84-
fnName = "calcFingerprintNative"
85-
fp, err = calcFingerprintNative(publicKeyContent)
86-
} else {
87-
fnName = "calcFingerprintSSHKeygen"
88-
fp, err = calcFingerprintSSHKeygen(publicKeyContent)
89-
}
79+
useNative := setting.SSH.KeygenPath == ""
80+
calcFn := util.Iif(useNative, calcFingerprintNative, calcFingerprintSSHKeygen)
81+
fp, err := calcFn(publicKeyContent)
9082
if err != nil {
9183
if IsErrKeyUnableVerify(err) {
92-
log.Info("%s", publicKeyContent)
9384
return "", err
9485
}
95-
return "", fmt.Errorf("%s: %w", fnName, err)
86+
return "", fmt.Errorf("CalcFingerprint(%s): %w", util.Iif(useNative, "native", "ssh-keygen"), err)
9687
}
9788
return fp, nil
9889
}

models/repo/issue.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ func (repo *Repository) IsDependenciesEnabled(ctx context.Context) bool {
5353
var u *RepoUnit
5454
var err error
5555
if u, err = repo.GetUnit(ctx, unit.TypeIssues); err != nil {
56-
log.Trace("%s", err)
56+
log.Trace("IsDependenciesEnabled: %v", err)
5757
return setting.Service.DefaultEnableDependencies
5858
}
5959
return u.IssuesConfig().EnableDependencies

modules/util/util.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ func ToPointer[T any](val T) *T {
214214
}
215215

216216
// Iif is an "inline-if", it returns "trueVal" if "condition" is true, otherwise "falseVal"
217-
func Iif[T comparable](condition bool, trueVal, falseVal T) T {
217+
func Iif[T any](condition bool, trueVal, falseVal T) T {
218218
if condition {
219219
return trueVal
220220
}

routers/api/v1/notify/repo.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ import (
1010

1111
activities_model "code.gitea.io/gitea/models/activities"
1212
"code.gitea.io/gitea/models/db"
13-
"code.gitea.io/gitea/modules/log"
1413
"code.gitea.io/gitea/modules/structs"
1514
"code.gitea.io/gitea/services/context"
1615
"code.gitea.io/gitea/services/convert"
@@ -201,7 +200,6 @@ func ReadRepoNotifications(ctx *context.APIContext) {
201200
if !ctx.FormBool("all") {
202201
statuses := ctx.FormStrings("status-types")
203202
opts.Status = statusStringsToNotificationStatuses(statuses, []string{"unread"})
204-
log.Error("%v", opts.Status)
205203
}
206204
nl, err := db.Find[activities_model.Notification](ctx, opts)
207205
if err != nil {

routers/private/actions.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ func GenerateActionsRunnerToken(ctx *context.PrivateContext) {
2626
defer rd.Close()
2727

2828
if err := json.NewDecoder(rd).Decode(&genRequest); err != nil {
29-
log.Error("%v", err)
29+
log.Error("JSON Decode failed: %v", err)
3030
ctx.JSON(http.StatusInternalServerError, private.Response{
3131
Err: err.Error(),
3232
})
@@ -35,7 +35,7 @@ func GenerateActionsRunnerToken(ctx *context.PrivateContext) {
3535

3636
owner, repo, err := parseScope(ctx, genRequest.Scope)
3737
if err != nil {
38-
log.Error("%v", err)
38+
log.Error("parseScope failed: %v", err)
3939
ctx.JSON(http.StatusInternalServerError, private.Response{
4040
Err: err.Error(),
4141
})
@@ -45,18 +45,18 @@ func GenerateActionsRunnerToken(ctx *context.PrivateContext) {
4545
if errors.Is(err, util.ErrNotExist) || (token != nil && !token.IsActive) {
4646
token, err = actions_model.NewRunnerToken(ctx, owner, repo)
4747
if err != nil {
48-
err := fmt.Sprintf("error while creating runner token: %v", err)
49-
log.Error("%v", err)
48+
errMsg := fmt.Sprintf("error while creating runner token: %v", err)
49+
log.Error("NewRunnerToken failed: %v", errMsg)
5050
ctx.JSON(http.StatusInternalServerError, private.Response{
51-
Err: err,
51+
Err: errMsg,
5252
})
5353
return
5454
}
5555
} else if err != nil {
56-
err := fmt.Sprintf("could not get unactivated runner token: %v", err)
57-
log.Error("%v", err)
56+
errMsg := fmt.Sprintf("could not get unactivated runner token: %v", err)
57+
log.Error("GetLatestRunnerToken failed: %v", errMsg)
5858
ctx.JSON(http.StatusInternalServerError, private.Response{
59-
Err: err,
59+
Err: errMsg,
6060
})
6161
return
6262
}

routers/private/hook_verification.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ func verifyCommits(oldCommitID, newCommitID string, repo *git.Repository, env []
4747
_ = stdoutWriter.Close()
4848
err := readAndVerifyCommitsFromShaReader(stdoutReader, repo, env)
4949
if err != nil {
50-
log.Error("%v", err)
50+
log.Error("readAndVerifyCommitsFromShaReader failed: %v", err)
5151
cancel()
5252
}
5353
_ = stdoutReader.Close()
@@ -66,7 +66,6 @@ func readAndVerifyCommitsFromShaReader(input io.ReadCloser, repo *git.Repository
6666
line := scanner.Text()
6767
err := readAndVerifyCommit(line, repo, env)
6868
if err != nil {
69-
log.Error("%v", err)
7069
return err
7170
}
7271
}

routers/private/mail.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ func SendEmail(ctx *context.PrivateContext) {
3535
defer rd.Close()
3636

3737
if err := json.NewDecoder(rd).Decode(&mail); err != nil {
38-
log.Error("%v", err)
38+
log.Error("JSON Decode failed: %v", err)
3939
ctx.JSON(http.StatusInternalServerError, private.Response{
4040
Err: err.Error(),
4141
})

routers/web/admin/users.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,6 @@ func EditUserPost(ctx *context.Context) {
403403
ctx.Data["Err_Password"] = true
404404
ctx.RenderWithErr(ctx.Tr("auth.password_pwned"), tplUserEdit, &form)
405405
case password.IsErrIsPwnedRequest(err):
406-
log.Error("%s", err.Error())
407406
ctx.Data["Err_Password"] = true
408407
ctx.RenderWithErr(ctx.Tr("auth.password_pwned_err"), tplUserEdit, &form)
409408
default:

routers/web/auth/password.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,6 @@ func ResetPasswdPost(ctx *context.Context) {
214214
case errors.Is(err, password.ErrIsPwned):
215215
ctx.RenderWithErr(ctx.Tr("auth.password_pwned"), tplResetPassword, nil)
216216
case password.IsErrIsPwnedRequest(err):
217-
log.Error("%s", err.Error())
218217
ctx.RenderWithErr(ctx.Tr("auth.password_pwned_err"), tplResetPassword, nil)
219218
default:
220219
ctx.ServerError("UpdateAuth", err)
@@ -298,7 +297,6 @@ func MustChangePasswordPost(ctx *context.Context) {
298297
ctx.Data["Err_Password"] = true
299298
ctx.RenderWithErr(ctx.Tr("auth.password_pwned"), tplMustChangePassword, &form)
300299
case password.IsErrIsPwnedRequest(err):
301-
log.Error("%s", err.Error())
302300
ctx.Data["Err_Password"] = true
303301
ctx.RenderWithErr(ctx.Tr("auth.password_pwned_err"), tplMustChangePassword, &form)
304302
default:

0 commit comments

Comments
 (0)