@@ -23,6 +23,7 @@ import (
23
23
"github.com/gitpod-io/gitpod/public-api-server/pkg/proxy"
24
24
"github.com/google/go-cmp/cmp"
25
25
"github.com/google/uuid"
26
+ "github.com/sirupsen/logrus"
26
27
"google.golang.org/protobuf/types/known/fieldmaskpb"
27
28
"google.golang.org/protobuf/types/known/timestamppb"
28
29
"gorm.io/gorm"
@@ -99,7 +100,7 @@ func (s *TokensService) CreatePersonalAccessToken(ctx context.Context, req *conn
99
100
}
100
101
101
102
func (s * TokensService ) GetPersonalAccessToken (ctx context.Context , req * connect.Request [v1.GetPersonalAccessTokenRequest ]) (* connect.Response [v1.GetPersonalAccessTokenResponse ], error ) {
102
- tokenID , err := validatePersonalAccessTokenID (req .Msg .GetId ())
103
+ tokenID , err := validatePersonalAccessTokenID (ctx , req .Msg .GetId ())
103
104
if err != nil {
104
105
return nil , err
105
106
}
@@ -149,7 +150,7 @@ func (s *TokensService) ListPersonalAccessTokens(ctx context.Context, req *conne
149
150
}
150
151
151
152
func (s * TokensService ) RegeneratePersonalAccessToken (ctx context.Context , req * connect.Request [v1.RegeneratePersonalAccessTokenRequest ]) (* connect.Response [v1.RegeneratePersonalAccessTokenResponse ], error ) {
152
- tokenID , err := validatePersonalAccessTokenID (req .Msg .GetId ())
153
+ tokenID , err := validatePersonalAccessTokenID (ctx , req .Msg .GetId ())
153
154
if err != nil {
154
155
return nil , err
155
156
}
@@ -201,7 +202,7 @@ func (s *TokensService) UpdatePersonalAccessToken(ctx context.Context, req *conn
201
202
202
203
tokenReq := req .Msg .GetToken ()
203
204
204
- tokenID , err := validatePersonalAccessTokenID (tokenReq .GetId ())
205
+ tokenID , err := validatePersonalAccessTokenID (ctx , tokenReq .GetId ())
205
206
if err != nil {
206
207
return nil , err
207
208
}
@@ -267,7 +268,7 @@ func (s *TokensService) UpdatePersonalAccessToken(ctx context.Context, req *conn
267
268
}
268
269
269
270
func (s * TokensService ) DeletePersonalAccessToken (ctx context.Context , req * connect.Request [v1.DeletePersonalAccessTokenRequest ]) (* connect.Response [v1.DeletePersonalAccessTokenResponse ], error ) {
270
- tokenID , err := validatePersonalAccessTokenID (req .Msg .GetId ())
271
+ tokenID , err := validatePersonalAccessTokenID (ctx , req .Msg .GetId ())
271
272
if err != nil {
272
273
return nil , err
273
274
}
@@ -301,6 +302,12 @@ func (s *TokensService) getUser(ctx context.Context, conn protocol.APIInterface)
301
302
return nil , uuid .Nil , proxy .ConvertError (err )
302
303
}
303
304
305
+ log .AddFields (ctx , logrus.Fields {
306
+ "user.id" : user .ID ,
307
+ "user.blocked" : user .Blocked ,
308
+ "user.prividged" : user .Privileged ,
309
+ })
310
+
304
311
if ! s .isFeatureEnabled (ctx , conn , user ) {
305
312
return nil , uuid .Nil , connect .NewError (connect .CodePermissionDenied , errors .New ("This feature is currently in beta. If you would like to be part of the beta, please contact us." ))
306
313
}
0 commit comments