- Implemented filename sanitization in backup, import, and certificate handlers to prevent log injection attacks. - Added tests to ensure filenames are sanitized correctly in backup and import handlers. - Updated notification and domain handlers to sanitize domain names before logging. - Introduced middleware functions for sanitizing request paths and headers to redact sensitive information in logs. - Enhanced recovery middleware to sanitize logged paths and headers during panic situations. - Updated various services to log sanitized values for sensitive fields.
26 lines
727 B
Go
26 lines
727 B
Go
package middleware
|
|
|
|
import (
|
|
"time"
|
|
"github.com/Wikid82/charon/backend/internal/util"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
// RequestLogger logs basic request information along with the request_id.
|
|
func RequestLogger() gin.HandlerFunc {
|
|
return func(c *gin.Context) {
|
|
start := time.Now()
|
|
c.Next()
|
|
latency := time.Since(start)
|
|
entry := GetRequestLogger(c)
|
|
entry.WithFields(map[string]interface{}{
|
|
"status": c.Writer.Status(),
|
|
"method": c.Request.Method,
|
|
"path": SanitizePath(c.Request.URL.Path),
|
|
"latency": latency.String(),
|
|
"client": util.SanitizeForLog(c.ClientIP()),
|
|
}).Info("handled request")
|
|
}
|
|
}
|