mirror of
https://github.com/directus/directus.git
synced 2026-04-25 03:00:53 -04:00
* removed incorrect redaction logic * updated paths that werent working * Added new redaction function * Reverting unintentional change * don't force lowercase provider names * extracted cookieNames * set cookie based on driver settings suggested by ian * add unit test * redact the entire cookie header * updated the tests * move redact text to constants --------- Co-authored-by: Azri Kahar <42867097+azrikahar@users.noreply.github.com> Co-authored-by: Rijk van Zanten <rijkvanzanten@me.com>
121 lines
2.9 KiB
TypeScript
121 lines
2.9 KiB
TypeScript
import { toArray } from '@directus/shared/utils';
|
|
import { merge } from 'lodash';
|
|
import pino, { LoggerOptions } from 'pino';
|
|
import type { Request, RequestHandler } from 'express';
|
|
import pinoHTTP, { stdSerializers } from 'pino-http';
|
|
import { URL } from 'url';
|
|
import env from './env';
|
|
import { REDACT_TEXT } from './constants';
|
|
import { getConfigFromEnv } from './utils/get-config-from-env';
|
|
|
|
const pinoOptions: LoggerOptions = {
|
|
level: env['LOG_LEVEL'] || 'info',
|
|
redact: {
|
|
paths: ['req.headers.authorization', 'req.headers.cookie'],
|
|
censor: REDACT_TEXT,
|
|
},
|
|
};
|
|
export const httpLoggerOptions: LoggerOptions = {
|
|
level: env['LOG_LEVEL'] || 'info',
|
|
redact: {
|
|
paths: ['req.headers.authorization', 'req.headers.cookie'],
|
|
censor: REDACT_TEXT,
|
|
},
|
|
};
|
|
|
|
if (env['LOG_STYLE'] !== 'raw') {
|
|
pinoOptions.transport = {
|
|
target: 'pino-pretty',
|
|
options: {
|
|
ignore: 'hostname,pid',
|
|
sync: true,
|
|
},
|
|
};
|
|
httpLoggerOptions.transport = {
|
|
target: 'pino-http-print',
|
|
options: {
|
|
all: true,
|
|
translateTime: 'SYS:HH:MM:ss',
|
|
relativeUrl: true,
|
|
prettyOptions: {
|
|
ignore: 'hostname,pid',
|
|
sync: true,
|
|
},
|
|
},
|
|
};
|
|
}
|
|
if (env['LOG_STYLE'] === 'raw') {
|
|
httpLoggerOptions.redact = {
|
|
paths: ['req.headers.authorization', 'req.headers.cookie', 'res.headers'],
|
|
censor: (value, pathParts) => {
|
|
const path = pathParts.join('.');
|
|
if (path === 'res.headers') {
|
|
if ('set-cookie' in value) {
|
|
value['set-cookie'] = REDACT_TEXT;
|
|
}
|
|
return value;
|
|
}
|
|
return REDACT_TEXT;
|
|
},
|
|
};
|
|
}
|
|
|
|
const loggerEnvConfig = getConfigFromEnv('LOGGER_', 'LOGGER_HTTP');
|
|
|
|
// Expose custom log levels into formatter function
|
|
if (loggerEnvConfig['levels']) {
|
|
const customLogLevels: { [key: string]: string } = {};
|
|
|
|
for (const el of toArray(loggerEnvConfig['levels'])) {
|
|
const key_val = el.split(':');
|
|
customLogLevels[key_val[0].trim()] = key_val[1].trim();
|
|
}
|
|
|
|
pinoOptions.formatters = {
|
|
level(label: string, number: any) {
|
|
return {
|
|
severity: customLogLevels[label] || 'info',
|
|
level: number,
|
|
};
|
|
},
|
|
};
|
|
httpLoggerOptions.formatters = {
|
|
level(label: string, number: any) {
|
|
return {
|
|
severity: customLogLevels[label] || 'info',
|
|
level: number,
|
|
};
|
|
},
|
|
};
|
|
|
|
delete loggerEnvConfig['levels'];
|
|
}
|
|
|
|
const logger = pino(merge(pinoOptions, loggerEnvConfig));
|
|
|
|
const httpLoggerEnvConfig = getConfigFromEnv('LOGGER_HTTP', ['LOGGER_HTTP_LOGGER']);
|
|
|
|
export const expressLogger = pinoHTTP({
|
|
logger: pino(merge(httpLoggerOptions, loggerEnvConfig)),
|
|
...httpLoggerEnvConfig,
|
|
serializers: {
|
|
req(request: Request) {
|
|
const output = stdSerializers.req(request);
|
|
output.url = redactQuery(output.url);
|
|
return output;
|
|
},
|
|
},
|
|
}) as RequestHandler;
|
|
|
|
export default logger;
|
|
|
|
function redactQuery(originalPath: string) {
|
|
const url = new URL(originalPath, 'http://example.com/');
|
|
|
|
if (url.searchParams.has('access_token')) {
|
|
url.searchParams.set('access_token', REDACT_TEXT);
|
|
}
|
|
|
|
return url.pathname + url.search;
|
|
}
|