mirror of
https://github.com/lordmathis/lemma.git
synced 2025-11-06 07:54:22 +00:00
Remove too many debug messages
This commit is contained in:
@@ -23,7 +23,6 @@ func initSecretsService(cfg *Config) (secrets.Service, error) {
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to initialize secrets service: %w", err)
|
||||
}
|
||||
logging.Debug("secrets service initialized")
|
||||
return secretsService, nil
|
||||
}
|
||||
|
||||
@@ -36,12 +35,10 @@ func initDatabase(cfg *Config, secretsService secrets.Service) (db.Database, err
|
||||
return nil, fmt.Errorf("failed to initialize database: %w", err)
|
||||
}
|
||||
|
||||
logging.Debug("running database migrations")
|
||||
if err := database.Migrate(); err != nil {
|
||||
return nil, fmt.Errorf("failed to apply database migrations: %w", err)
|
||||
}
|
||||
|
||||
logging.Debug("database initialization complete")
|
||||
return database, nil
|
||||
}
|
||||
|
||||
@@ -61,14 +58,8 @@ func initAuth(cfg *Config, database db.Database) (auth.JWTManager, auth.SessionM
|
||||
if err != nil {
|
||||
return nil, nil, nil, fmt.Errorf("failed to ensure JWT secret: %w", err)
|
||||
}
|
||||
logging.Debug("JWT signing key generated")
|
||||
}
|
||||
|
||||
logging.Debug("initializing JWT service",
|
||||
"accessTokenExpiry", accessTokeExpiry.String(),
|
||||
"refreshTokenExpiry", refreshTokenExpiry.String())
|
||||
|
||||
// Initialize JWT service
|
||||
jwtManager, err := auth.NewJWTService(auth.JWTConfig{
|
||||
SigningKey: signingKey,
|
||||
AccessTokenExpiry: accessTokeExpiry,
|
||||
@@ -78,24 +69,14 @@ func initAuth(cfg *Config, database db.Database) (auth.JWTManager, auth.SessionM
|
||||
return nil, nil, nil, fmt.Errorf("failed to initialize JWT service: %w", err)
|
||||
}
|
||||
|
||||
// Initialize session service
|
||||
logging.Debug("initializing session service")
|
||||
sessionManager := auth.NewSessionService(database, jwtManager)
|
||||
|
||||
// Initialize cookie service
|
||||
logging.Debug("initializing cookie service",
|
||||
"isDevelopment", cfg.IsDevelopment,
|
||||
"domain", cfg.Domain)
|
||||
cookieService := auth.NewCookieService(cfg.IsDevelopment, cfg.Domain)
|
||||
|
||||
logging.Debug("authentication services initialized")
|
||||
return jwtManager, sessionManager, cookieService, nil
|
||||
}
|
||||
|
||||
// setupAdminUser creates the admin user if it doesn't exist
|
||||
func setupAdminUser(database db.Database, storageManager storage.Manager, cfg *Config) error {
|
||||
logging.Debug("checking for existing admin user", "email", cfg.AdminEmail)
|
||||
|
||||
// Check if admin user exists
|
||||
adminUser, err := database.GetUserByEmail(cfg.AdminEmail)
|
||||
if err != nil && err != sql.ErrNoRows {
|
||||
@@ -107,8 +88,6 @@ func setupAdminUser(database db.Database, storageManager storage.Manager, cfg *C
|
||||
return nil
|
||||
}
|
||||
|
||||
logging.Debug("creating new admin user")
|
||||
|
||||
// Hash the password
|
||||
hashedPassword, err := bcrypt.GenerateFromPassword([]byte(cfg.AdminPassword), bcrypt.DefaultCost)
|
||||
if err != nil {
|
||||
@@ -128,15 +107,6 @@ func setupAdminUser(database db.Database, storageManager storage.Manager, cfg *C
|
||||
return fmt.Errorf("failed to create admin user: %w", err)
|
||||
}
|
||||
|
||||
logging.Debug("admin user created",
|
||||
"userId", createdUser.ID,
|
||||
"workspaceId", createdUser.LastWorkspaceID)
|
||||
|
||||
// Initialize workspace directory
|
||||
logging.Debug("initializing admin workspace directory",
|
||||
"userId", createdUser.ID,
|
||||
"workspaceId", createdUser.LastWorkspaceID)
|
||||
|
||||
err = storageManager.InitializeUserWorkspace(createdUser.ID, createdUser.LastWorkspaceID)
|
||||
if err != nil {
|
||||
return fmt.Errorf("failed to initialize admin workspace: %w", err)
|
||||
|
||||
@@ -31,7 +31,6 @@ func setupRouter(o Options) *chi.Mux {
|
||||
r.Use(middleware.Timeout(30 * time.Second))
|
||||
|
||||
// Security headers
|
||||
logging.Debug("setting up security headers")
|
||||
r.Use(secure.New(secure.Options{
|
||||
SSLRedirect: false,
|
||||
SSLProxyHeaders: map[string]string{"X-Forwarded-Proto": "https"},
|
||||
@@ -39,7 +38,6 @@ func setupRouter(o Options) *chi.Mux {
|
||||
}).Handler)
|
||||
|
||||
// CORS if origins are configured
|
||||
logging.Debug("setting up CORS")
|
||||
if len(o.Config.CORSOrigins) > 0 {
|
||||
r.Use(cors.Handler(cors.Options{
|
||||
AllowedOrigins: o.Config.CORSOrigins,
|
||||
@@ -52,7 +50,6 @@ func setupRouter(o Options) *chi.Mux {
|
||||
}
|
||||
|
||||
// Initialize auth middleware and handler
|
||||
logging.Debug("setting up authentication middleware")
|
||||
authMiddleware := auth.NewMiddleware(o.JWTManager, o.SessionManager, o.CookieService)
|
||||
handler := &handlers.Handler{
|
||||
DB: o.Database,
|
||||
@@ -60,14 +57,12 @@ func setupRouter(o Options) *chi.Mux {
|
||||
}
|
||||
|
||||
if o.Config.IsDevelopment {
|
||||
logging.Debug("setting up Swagger docs")
|
||||
r.Get("/swagger/*", httpSwagger.Handler(
|
||||
httpSwagger.URL("/swagger/doc.json"), // The URL pointing to API definition
|
||||
))
|
||||
}
|
||||
|
||||
// API routes
|
||||
logging.Debug("setting up API routes")
|
||||
r.Route("/api/v1", func(r chi.Router) {
|
||||
// Rate limiting for API routes
|
||||
if o.Config.RateLimitRequests > 0 {
|
||||
@@ -154,7 +149,6 @@ func setupRouter(o Options) *chi.Mux {
|
||||
})
|
||||
|
||||
// Handle all other routes with static file server
|
||||
logging.Debug("setting up static file server")
|
||||
r.Get("/*", handlers.NewStaticHandler(o.Config.StaticPath).ServeHTTP)
|
||||
|
||||
return r
|
||||
|
||||
Reference in New Issue
Block a user