Skip to content

feat: record user in operation logs#12596

Merged
ssongliu merged 1 commit intodev-duofrom
feature/operation-log-user
Apr 24, 2026
Merged

feat: record user in operation logs#12596
ssongliu merged 1 commit intodev-duofrom
feature/operation-log-user

Conversation

@ssongliu
Copy link
Copy Markdown
Member

No description provided.

@f2c-ci-robot
Copy link
Copy Markdown

f2c-ci-robot Bot commented Apr 24, 2026

Adding the "do-not-merge/release-note-label-needed" label because no release-note block was detected, please follow our release note process to remove it.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@ssongliu ssongliu merged commit 1b19a75 into dev-duo Apr 24, 2026
2 checks passed
@f2c-ci-robot
Copy link
Copy Markdown

f2c-ci-robot Bot commented Apr 24, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign ssongliu for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@ssongliu ssongliu deleted the feature/operation-log-user branch April 24, 2026 08:36
Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: e99a662336

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +180 to +182
sessionUser, ok := c.Get(psessionUtils.GinContextSessionUserKey)
if !ok {
return ""
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Fall back to session lookup when context user is missing

loadOperationUser only checks GinContextSessionUserKey and returns "" when that key is absent. In this middleware stack, some logged routes (notably /api/v2/core/auth/*) bypass the code path that sets this context value, so requests with valid session cookies still get stored with an empty user field; this makes the new operation-log user column unreliable for actions like MFA/API config changes. Add a fallback to read the current session directly when the context key is unavailable.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants