@@ -115,8 +115,8 @@ func handleAuthorizationCode(w http.ResponseWriter, r *http.Request, tm *token.M
115115
116116 accessToken , _ , err := tm .Issue (audience , code .Subject , code .Email , client .ID , code .Groups , accessTokenTTL )
117117 if err != nil {
118- logger .Error ("failed to issue token " , zap .Error (err ))
119- writeOAuthError (w , http .StatusInternalServerError , "server_error" , "failed to issue token " )
118+ logger .Error ("token_issue_failed " , zap .Error (err ))
119+ writeOAuthError (w , http .StatusInternalServerError , "server_error" , "token_issue_failed " )
120120 return
121121 }
122122
@@ -132,12 +132,12 @@ func handleAuthorizationCode(w http.ResponseWriter, r *http.Request, tm *token.M
132132 }
133133 refreshToken , err := tm .SealJSON (refresh )
134134 if err != nil {
135- logger .Error ("failed to seal refresh token " , zap .Error (err ))
135+ logger .Error ("refresh_token_seal_failed " , zap .Error (err ))
136136 writeOAuthError (w , http .StatusInternalServerError , "server_error" , "internal error" )
137137 return
138138 }
139139
140- logger .Info ("token issued " , zap .String ("subject" , code .Subject ), zap .String ("client_id" , client .ID ))
140+ logger .Info ("token_issued " , zap .String ("subject" , code .Subject ), zap .String ("client_id" , client .ID ))
141141
142142 // RFC 6749 §5.1: token responses must not be cached
143143 w .Header ().Set ("Cache-Control" , "no-store" )
@@ -173,7 +173,7 @@ func handleRefreshToken(w http.ResponseWriter, r *http.Request, tm *token.Manage
173173 // Without this check, REVOKE_BEFORE only invalidates access tokens and a
174174 // compromised refresh token would silently mint fresh ones past the cutoff.
175175 if ! revokeBefore .IsZero () && refresh .IssuedAt .Before (revokeBefore ) {
176- logger .Debug ("refresh token revoked by iat cutoff " ,
176+ logger .Debug ("refresh_token_revoked_iat_cutoff " ,
177177 zap .Time ("issued_at" , refresh .IssuedAt ),
178178 zap .Time ("revoke_before" , revokeBefore ),
179179 )
@@ -209,8 +209,8 @@ func handleRefreshToken(w http.ResponseWriter, r *http.Request, tm *token.Manage
209209
210210 accessToken , _ , err := tm .Issue (audience , refresh .Subject , refresh .Email , client .ID , refresh .Groups , accessTokenTTL )
211211 if err != nil {
212- logger .Error ("failed to issue token on refresh " , zap .Error (err ))
213- writeOAuthError (w , http .StatusInternalServerError , "server_error" , "failed to issue token " )
212+ logger .Error ("token_refresh_issue_failed " , zap .Error (err ))
213+ writeOAuthError (w , http .StatusInternalServerError , "server_error" , "token_issue_failed " )
214214 return
215215 }
216216
@@ -226,12 +226,12 @@ func handleRefreshToken(w http.ResponseWriter, r *http.Request, tm *token.Manage
226226 }
227227 newRefreshToken , err := tm .SealJSON (newRefresh )
228228 if err != nil {
229- logger .Error ("failed to seal new refresh token " , zap .Error (err ))
229+ logger .Error ("refresh_token_reseal_failed " , zap .Error (err ))
230230 writeOAuthError (w , http .StatusInternalServerError , "server_error" , "internal error" )
231231 return
232232 }
233233
234- logger .Info ("token refreshed " , zap .String ("subject" , refresh .Subject ), zap .String ("client_id" , client .ID ))
234+ logger .Info ("token_refreshed " , zap .String ("subject" , refresh .Subject ), zap .String ("client_id" , client .ID ))
235235
236236 // RFC 6749 §5.1: token responses must not be cached
237237 w .Header ().Set ("Cache-Control" , "no-store" )
0 commit comments