log.Error("could not migrate permissions","migration","scopeSplit","total",len(permissions),"succeeded",cnt,"left",len(permissions)-cnt,"error",errBatchUpdate)
log.Error("Could not migrate permissions","migration","scopeSplit","total",len(permissions),"succeeded",cnt,"left",len(permissions)-cnt,"error",errBatchUpdate)
ctxLogger.Debug("user token has expired","user ID",model.UserId,"token ID",model.Id)
ctxLogger.Debug("User token has expired","user ID",model.UserId,"token ID",model.Id)
returnnil,&auth.TokenExpiredError{
UserID:model.UserId,
TokenID:model.Id,
@ -170,9 +170,9 @@ func (s *UserAuthTokenService) LookupToken(ctx context.Context, unhashedToken st
}
ifaffectedRows==0{
ctxLogger.Debug("prev seen token unchanged","tokenId",model.Id,"userId",model.UserId,"clientIP",model.ClientIp,"userAgent",model.UserAgent,"authToken",model.AuthToken)
ctxLogger.Debug("Prev seen token unchanged","tokenId",model.Id,"userId",model.UserId,"clientIP",model.ClientIp,"userAgent",model.UserAgent,"authToken",model.AuthToken)
}else{
ctxLogger.Debug("prev seen token","tokenId",model.Id,"userId",model.UserId,"clientIP",model.ClientIp,"userAgent",model.UserAgent,"authToken",model.AuthToken)
ctxLogger.Debug("Prev seen token","tokenId",model.Id,"userId",model.UserId,"clientIP",model.ClientIp,"userAgent",model.UserAgent,"authToken",model.AuthToken)
}
}
@ -196,9 +196,9 @@ func (s *UserAuthTokenService) LookupToken(ctx context.Context, unhashedToken st
@ -462,7 +462,7 @@ func (s *OAuth2ServiceImpl) createServiceAccount(ctx context.Context, extSvcName
returnoauthserver.NoServiceAccountID,err
}
s.logger.Debug("create tailored role for service account","external service name",extSvcName,"name",slug,"service_account_id",sa.Id,"permissions",permissions)
s.logger.Debug("Create tailored role for service account","external service name",extSvcName,"name",slug,"service_account_id",sa.Id,"permissions",permissions)