@@ -77,7 +77,7 @@ func withResponseLogging(handler http.Handler) http.Handler {
7777 handler .ServeHTTP (lw , r )
7878 if len (lw .Body ()) > 0 {
7979 sanitizedBody := sanitize .SanitizeString (string (lw .Body ()))
80- log .Printf ("[%s] %s %s - Status: %d, Response: %s" , r .RemoteAddr , r .Method , r .URL .Path , lw .StatusCode (), sanitizedBody )
80+ logHelpers .Printf ("[%s] %s %s - Status: %d, Response: %s" , r .RemoteAddr , r .Method , r .URL .Path , lw .StatusCode (), sanitizedBody )
8181 }
8282 })
8383}
@@ -93,7 +93,6 @@ func extractAndValidateSession(r *http.Request) string {
9393 if sessionID == "" {
9494 logHelpers .Printf ("Session extraction failed: no Authorization header, remote=%s" , r .RemoteAddr )
9595 logger .LogError ("client" , "Rejected MCP client connection: no Authorization header, remote=%s, path=%s" , r .RemoteAddr , r .URL .Path )
96- log .Printf ("[%s] %s %s - REJECTED: No Authorization header" , r .RemoteAddr , r .Method , r .URL .Path )
9796 return ""
9897 }
9998
@@ -155,7 +154,6 @@ func logHTTPRequestBody(r *http.Request, sessionID, backendID string) {
155154 } else {
156155 logger .LogDebug ("client" , "MCP request body, session=%s, body=%s" , sessionID , sanitizedBody )
157156 }
158- log .Printf ("Request body: %s" , sanitizedBody )
159157 logHelpers .Print ("Request body logged for debugging" )
160158}
161159
@@ -189,23 +187,14 @@ func setupSessionCallback(r *http.Request, backendID string) (string, bool) {
189187 if backendID != "" {
190188 logger .LogInfo ("client" , "New MCP client connection, remote=%s, method=%s, path=%s, backend=%s, session=%s" ,
191189 r .RemoteAddr , r .Method , r .URL .Path , backendID , sessionID )
192- log .Printf ("=== NEW STREAMABLE HTTP CONNECTION (ROUTED) ===" )
193190 } else {
194191 logger .LogInfo ("client" , "MCP connection established, remote=%s, method=%s, path=%s, session=%s" ,
195192 r .RemoteAddr , r .Method , r .URL .Path , sessionID )
196- log .Printf ("=== NEW STREAMABLE HTTP CONNECTION ===" )
197193 }
198- log .Printf ("[%s] %s %s" , r .RemoteAddr , r .Method , r .URL .Path )
199- if backendID != "" {
200- log .Printf ("Backend: %s" , backendID )
201- }
202- log .Printf ("Authorization (Session ID): %s" , sanitize .TruncateSecret (sessionID ))
203194
204195 logHTTPRequestBody (r , sessionID , backendID )
205196
206197 * r = * injectSessionContext (r , sessionID , backendID )
207- log .Printf ("✓ Injected session ID into context" )
208- log .Printf ("===================================\n " )
209198
210199 return sessionID , true
211200}
0 commit comments