@@ -318,7 +318,7 @@ func Test_ResolveRequest(t *testing.T) {
318
318
require .Equal (t ,codersdk .SignedAppTokenCookie ,cookie .Name )
319
319
require .Equal (t ,req .BasePath ,cookie .Path )
320
320
321
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,me .ID )
321
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,database . ConnectionTypeWorkspaceApp , me .ID )
322
322
require .Len (t ,connLogger .ConnectionLogs (),1 )
323
323
324
324
var parsedToken workspaceapps.SignedToken
@@ -398,7 +398,7 @@ func Test_ResolveRequest(t *testing.T) {
398
398
require .NotNil (t ,token )
399
399
require .Zero (t ,w .StatusCode )
400
400
401
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,secondUser .ID )
401
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,database . ConnectionTypeWorkspaceApp , secondUser .ID )
402
402
require .Len (t ,connLogger .ConnectionLogs (),1 )
403
403
}
404
404
})
@@ -438,7 +438,7 @@ func Test_ResolveRequest(t *testing.T) {
438
438
require .NotZero (t ,rw .Code )
439
439
require .NotEqual (t ,http .StatusOK ,rw .Code )
440
440
441
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,uuid .Nil )
441
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,database . ConnectionTypeWorkspaceApp , uuid .Nil )
442
442
require .Len (t ,connLogger .ConnectionLogs (),1 )
443
443
}else {
444
444
if ! assert .True (t ,ok ) {
@@ -452,7 +452,7 @@ func Test_ResolveRequest(t *testing.T) {
452
452
t .Fatalf ("expected 200 (or unset) response code, got %d" ,rw .Code )
453
453
}
454
454
455
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,uuid .Nil )
455
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,database . ConnectionTypeWorkspaceApp , uuid .Nil )
456
456
require .Len (t ,connLogger .ConnectionLogs (),1 )
457
457
}
458
458
_ = w .Body .Close ()
@@ -577,7 +577,7 @@ func Test_ResolveRequest(t *testing.T) {
577
577
require .Equal (t ,token .AgentNameOrID ,c .agent )
578
578
require .Equal (t ,token .WorkspaceID ,workspace .ID )
579
579
require .Equal (t ,token .AgentID ,agentID )
580
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,token .AppSlugOrPort ,me .ID )
580
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,token .AppSlugOrPort ,database . ConnectionTypeWorkspaceApp , me .ID )
581
581
require .Len (t ,connLogger .ConnectionLogs (),1 )
582
582
}else {
583
583
require .Nil (t ,token )
@@ -662,7 +662,7 @@ func Test_ResolveRequest(t *testing.T) {
662
662
require .NoError (t ,err )
663
663
require .Equal (t ,appNameOwner ,parsedToken .AppSlugOrPort )
664
664
665
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameOwner ,me .ID )
665
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameOwner ,database . ConnectionTypeWorkspaceApp , me .ID )
666
666
require .Len (t ,connLogger .ConnectionLogs (),1 )
667
667
})
668
668
@@ -735,7 +735,7 @@ func Test_ResolveRequest(t *testing.T) {
735
735
require .True (t ,ok )
736
736
require .Equal (t ,req .AppSlugOrPort ,token .AppSlugOrPort )
737
737
require .Equal (t ,"http://127.0.0.1:9090" ,token .AppURL )
738
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,"9090" ,me .ID )
738
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,"9090" ,database . ConnectionTypePortForwarding , me .ID )
739
739
require .Len (t ,connLogger .ConnectionLogs (),1 )
740
740
})
741
741
@@ -808,7 +808,7 @@ func Test_ResolveRequest(t *testing.T) {
808
808
})
809
809
require .True (t ,ok )
810
810
require .Equal (t ,req .AppSlugOrPort ,token .AppSlugOrPort )
811
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameEndsInS ,me .ID )
811
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameEndsInS ,database . ConnectionTypeWorkspaceApp , me .ID )
812
812
require .Len (t ,connLogger .ConnectionLogs (),1 )
813
813
})
814
814
@@ -845,7 +845,7 @@ func Test_ResolveRequest(t *testing.T) {
845
845
require .Equal (t ,req .AgentNameOrID ,token .Request .AgentNameOrID )
846
846
require .Empty (t ,token .AppSlugOrPort )
847
847
require .Empty (t ,token .AppURL )
848
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,"terminal" ,me .ID )
848
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,"terminal" ,database . ConnectionTypeWorkspaceApp , me .ID )
849
849
require .Len (t ,connLogger .ConnectionLogs (),1 )
850
850
})
851
851
@@ -879,7 +879,7 @@ func Test_ResolveRequest(t *testing.T) {
879
879
})
880
880
require .False (t ,ok )
881
881
require .Nil (t ,token )
882
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameOwner ,secondUser .ID )
882
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameOwner ,database . ConnectionTypeWorkspaceApp , secondUser .ID )
883
883
require .Len (t ,connLogger .ConnectionLogs (),1 )
884
884
})
885
885
@@ -953,7 +953,7 @@ func Test_ResolveRequest(t *testing.T) {
953
953
require .Equal (t ,http .StatusSeeOther ,w .StatusCode )
954
954
// Note that we don't capture the owner UUID here because the apiKey
955
955
// check/authorization exits early.
956
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameOwner ,uuid .Nil )
956
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,appNameOwner ,database . ConnectionTypeWorkspaceApp , uuid .Nil )
957
957
require .Len (t ,connLogger .ConnectionLogs (),1 )
958
958
959
959
loc ,err := w .Location ()
@@ -1015,7 +1015,7 @@ func Test_ResolveRequest(t *testing.T) {
1015
1015
w := rw .Result ()
1016
1016
defer w .Body .Close ()
1017
1017
require .Equal (t ,http .StatusBadGateway ,w .StatusCode )
1018
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentNameUnhealthy ,appNameAgentUnhealthy ,me .ID )
1018
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentNameUnhealthy ,appNameAgentUnhealthy ,database . ConnectionTypeWorkspaceApp , me .ID )
1019
1019
require .Len (t ,connLogger .ConnectionLogs (),1 )
1020
1020
1021
1021
body ,err := io .ReadAll (w .Body )
@@ -1074,7 +1074,7 @@ func Test_ResolveRequest(t *testing.T) {
1074
1074
})
1075
1075
require .True (t ,ok ,"ResolveRequest failed, should pass even though app is initializing" )
1076
1076
require .NotNil (t ,token )
1077
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,token .AppSlugOrPort ,me .ID )
1077
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,token .AppSlugOrPort ,database . ConnectionTypeWorkspaceApp , me .ID )
1078
1078
require .Len (t ,connLogger .ConnectionLogs (),1 )
1079
1079
})
1080
1080
@@ -1132,7 +1132,7 @@ func Test_ResolveRequest(t *testing.T) {
1132
1132
})
1133
1133
require .True (t ,ok ,"ResolveRequest failed, should pass even though app is unhealthy" )
1134
1134
require .NotNil (t ,token )
1135
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,token .AppSlugOrPort ,me .ID )
1135
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,token .AppSlugOrPort ,database . ConnectionTypeWorkspaceApp , me .ID )
1136
1136
require .Len (t ,connLogger .ConnectionLogs (),1 )
1137
1137
})
1138
1138
@@ -1169,7 +1169,7 @@ func Test_ResolveRequest(t *testing.T) {
1169
1169
AppRequest :req ,
1170
1170
})
1171
1171
require .True (t ,ok )
1172
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,me .ID )
1172
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,database . ConnectionTypeWorkspaceApp , me .ID )
1173
1173
require .Len (t ,connLogger .ConnectionLogs (),1 )
1174
1174
1175
1175
// Second request, no audit log because the session is active.
@@ -1205,7 +1205,7 @@ func Test_ResolveRequest(t *testing.T) {
1205
1205
AppRequest :req ,
1206
1206
})
1207
1207
require .True (t ,ok )
1208
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,me .ID )
1208
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,database . ConnectionTypeWorkspaceApp , me .ID )
1209
1209
require .Len (t ,connLogger .ConnectionLogs (),2 ,"two connection logs, session timed out" )
1210
1210
1211
1211
// Fourth request, new IP produces new audit log.
@@ -1224,7 +1224,7 @@ func Test_ResolveRequest(t *testing.T) {
1224
1224
AppRequest :req ,
1225
1225
})
1226
1226
require .True (t ,ok )
1227
- assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,me .ID )
1227
+ assertConnLogContains (t ,rw ,r ,connLogger ,workspace ,agentName ,app ,database . ConnectionTypeWorkspaceApp , me .ID )
1228
1228
require .Len (t ,connLogger .ConnectionLogs (),3 ,"three connection logs, new IP" )
1229
1229
}
1230
1230
})
@@ -1257,7 +1257,7 @@ func signedTokenProviderWithConnLogger(t testing.TB, provider workspaceapps.Sign
1257
1257
return & shallowCopy
1258
1258
}
1259
1259
1260
- func assertConnLogContains (t * testing.T ,rr * httptest.ResponseRecorder ,r * http.Request ,connLogger * connectionlog.MockConnectionLogger ,workspace codersdk.Workspace ,agentName string ,slugOrPort string ,userID uuid.UUID ) {
1260
+ func assertConnLogContains (t * testing.T ,rr * httptest.ResponseRecorder ,r * http.Request ,connLogger * connectionlog.MockConnectionLogger ,workspace codersdk.Workspace ,agentName string ,slugOrPort string ,typ database. ConnectionType , userID uuid.UUID ) {
1261
1261
t .Helper ()
1262
1262
1263
1263
resp := rr .Result ()
@@ -1269,7 +1269,7 @@ func assertConnLogContains(t *testing.T, rr *httptest.ResponseRecorder, r *http.
1269
1269
WorkspaceID :workspace .ID ,
1270
1270
WorkspaceName :workspace .Name ,
1271
1271
AgentName :agentName ,
1272
- Type :database . ConnectionTypeWeb ,
1272
+ Type :typ ,
1273
1273
Ip :database .ParseIP (r .RemoteAddr ),
1274
1274
UserAgent : sql.NullString {Valid :r .UserAgent ()!= "" ,String :r .UserAgent ()},
1275
1275
Code : sql.NullInt32 {