@@ -44,7 +44,7 @@ func (s *Capability) Start(ctx context.Context) error {
4444 closeHandler := func () {
4545 ierr := s .handler .Close ()
4646 if ierr != nil {
47- s .lggr .Errorf ("error closing vault DON request handler after failed registration: %v " , ierr )
47+ s .lggr .Errorw ("error closing vault DON request handler after failed registration" , "err " , ierr )
4848 }
4949 }
5050
@@ -168,50 +168,50 @@ func (s *Capability) Execute(ctx context.Context, request capabilities.Capabilit
168168}
169169
170170func (s * Capability ) CreateSecrets (ctx context.Context , request * vaultcommon.CreateSecretsRequest ) (* vaulttypes.Response , error ) {
171- s .lggr .Debugf ( "Received Request: %s " , request .String ())
171+ s .lggr .Debugw ( "received create secrets request" , "request " , request .String ())
172172 resolvedIdentity , err := s .resolveRequestIdentity (ctx , request .OrgId , request .WorkflowOwner )
173173 if err != nil {
174174 return nil , err
175175 }
176176 request .OrgId = resolvedIdentity .OrgID
177177 request .WorkflowOwner = resolvedIdentity .WorkflowOwner
178178 if ownerErr := validateEncryptedSecretOwnersMatchResolvedIdentity (request .EncryptedSecrets , resolvedIdentity ); ownerErr != nil {
179- s .lggr .Debugf ( "RequestId: [%s] failed identity owner checks: %s" , request .RequestId , ownerErr . Error () )
179+ s .lggr .Debugw ( " failed identity owner checks" , "requestID" , request .RequestId , "err" , ownerErr )
180180 return nil , ownerErr
181181 }
182182 err = s .ValidateCreateSecretsRequest (ctx , s .publicKey .Get (), request , false )
183183 if err != nil {
184- s .lggr .Debugf ( "RequestId: [%s] failed validation checks: %s" , request .RequestId , err . Error () )
184+ s .lggr .Debugw ( " failed validation checks" , "requestID" , request .RequestId , " err" , err )
185185 return nil , err
186186 }
187187 return s .handleRequest (ctx , request .RequestId , request )
188188}
189189
190190func (s * Capability ) UpdateSecrets (ctx context.Context , request * vaultcommon.UpdateSecretsRequest ) (* vaulttypes.Response , error ) {
191- s .lggr .Debugf ( "Received Request: %s " , request .String ())
191+ s .lggr .Debugw ( "received update secrets request" , "request " , request .String ())
192192 resolvedIdentity , err := s .resolveRequestIdentity (ctx , request .OrgId , request .WorkflowOwner )
193193 if err != nil {
194194 return nil , err
195195 }
196196 request .OrgId = resolvedIdentity .OrgID
197197 request .WorkflowOwner = resolvedIdentity .WorkflowOwner
198198 if ownerErr := validateEncryptedSecretOwnersMatchResolvedIdentity (request .EncryptedSecrets , resolvedIdentity ); ownerErr != nil {
199- s .lggr .Debugf ( "RequestId: [%s] failed identity owner checks: %s" , request .RequestId , ownerErr . Error () )
199+ s .lggr .Debugw ( " failed identity owner checks" , "requestID" , request .RequestId , "err" , ownerErr )
200200 return nil , ownerErr
201201 }
202202 err = s .ValidateUpdateSecretsRequest (ctx , s .publicKey .Get (), request , false )
203203 if err != nil {
204- s .lggr .Debugf ( "RequestId: [%s] failed validation checks: %s" , request .RequestId , err . Error () )
204+ s .lggr .Debugw ( " failed validation checks" , "requestID" , request .RequestId , " err" , err )
205205 return nil , err
206206 }
207207 return s .handleRequest (ctx , request .RequestId , request )
208208}
209209
210210func (s * Capability ) DeleteSecrets (ctx context.Context , request * vaultcommon.DeleteSecretsRequest ) (* vaulttypes.Response , error ) {
211- s .lggr .Debugf ( "Received Request: %s " , request .String ())
211+ s .lggr .Debugw ( "received delete secrets request" , "request " , request .String ())
212212 err := s .ValidateDeleteSecretsRequest (request )
213213 if err != nil {
214- s .lggr .Debugf ( "Request: [%s] failed validation checks: %s" , request .String (), err . Error () )
214+ s .lggr .Debugw ( " failed validation checks" , "requestID" , request .RequestId , "request" , request . String (), " err" , err )
215215 return nil , err
216216 }
217217 resolvedIdentity , err := s .resolveRequestIdentity (ctx , request .OrgId , request .WorkflowOwner )
@@ -221,16 +221,16 @@ func (s *Capability) DeleteSecrets(ctx context.Context, request *vaultcommon.Del
221221 request .OrgId = resolvedIdentity .OrgID
222222 request .WorkflowOwner = resolvedIdentity .WorkflowOwner
223223 if err := validateSecretIdentifierOwnersMatchResolvedIdentity (request .Ids , resolvedIdentity ); err != nil {
224- s .lggr .Debugf ( "Request: [%s] failed identity owner checks: %s" , request .String (), err . Error () )
224+ s .lggr .Debugw ( " failed identity owner checks" , "requestID" , request .RequestId , "request" , request . String (), " err" , err )
225225 return nil , err
226226 }
227227 return s .handleRequest (ctx , request .RequestId , request )
228228}
229229
230230func (s * Capability ) GetSecrets (ctx context.Context , requestID string , request * vaultcommon.GetSecretsRequest ) (* vaulttypes.Response , error ) {
231- s .lggr .Debugf ( "Received Request: %s " , request .String ())
231+ s .lggr .Debugw ( "received get secrets request" , "request " , request .String ())
232232 if err := s .ValidateGetSecretsRequest (request ); err != nil {
233- s .lggr .Debugf ( "Request: [%s] failed validation checks: %s" , request .String (), err . Error () )
233+ s .lggr .Debugw ( " failed validation checks" , "requestID" , requestID , " request" , request .String (), " err" , err )
234234 return nil , err
235235 }
236236
@@ -239,10 +239,10 @@ func (s *Capability) GetSecrets(ctx context.Context, requestID string, request *
239239}
240240
241241func (s * Capability ) ListSecretIdentifiers (ctx context.Context , request * vaultcommon.ListSecretIdentifiersRequest ) (* vaulttypes.Response , error ) {
242- s .lggr .Debugf ( "Received Request: %s " , request .String ())
242+ s .lggr .Debugw ( "received list secret identifiers request" , "request " , request .String ())
243243 err := s .ValidateListSecretIdentifiersRequest (request )
244244 if err != nil {
245- s .lggr .Debugf ( "Request: [%s] failed validation checks: %s" , request .String (), err . Error () )
245+ s .lggr .Debugw ( " failed validation checks" , "requestID" , request .RequestId , "request" , request . String (), " err" , err )
246246 return nil , err
247247 }
248248 resolvedIdentity , err := s .resolveRequestIdentity (ctx , request .OrgId , request .WorkflowOwner )
@@ -252,15 +252,15 @@ func (s *Capability) ListSecretIdentifiers(ctx context.Context, request *vaultco
252252 request .OrgId = resolvedIdentity .OrgID
253253 request .WorkflowOwner = resolvedIdentity .WorkflowOwner
254254 if err := validateOwnerMatchesResolvedIdentity ("owner" , request .Owner , resolvedIdentity ); err != nil {
255- s .lggr .Debugf ( "Request: [%s] failed identity owner checks: %s" , request .String (), err . Error () )
255+ s .lggr .Debugw ( " failed identity owner checks" , "requestID" , request .RequestId , "request" , request . String (), " err" , err )
256256 return nil , err
257257 }
258258 return s .handleRequest (ctx , request .RequestId , request )
259259}
260260
261261func (s * Capability ) GetPublicKey (ctx context.Context , request * vaultcommon.GetPublicKeyRequest ) (* vaultcommon.GetPublicKeyResponse , error ) {
262262 l := logger .With (s .lggr , "method" , "GetPublicKey" )
263- l .Debugf ( "Received Request: GetPublicKeyRequest " )
263+ l .Debug ( "received get public key request " )
264264
265265 pubKey := s .publicKey .Get ()
266266 if pubKey == nil {
@@ -270,7 +270,7 @@ func (s *Capability) GetPublicKey(ctx context.Context, request *vaultcommon.GetP
270270
271271 pkb , err := pubKey .Marshal ()
272272 if err != nil {
273- l .Debugf ("could not marshal public key: %s" , err . Error () )
273+ l .Debugw ("could not marshal public key" , "err" , err )
274274 return nil , fmt .Errorf ("could not marshal public key: %w" , err )
275275 }
276276
0 commit comments