summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLars Wirzenius <liw@liw.fi>2017-11-28 19:35:39 +0200
committerLars Wirzenius <liw@liw.fi>2017-11-28 19:35:39 +0200
commit94e4b0766eb6f127c8d9d8d51cecfe404d8c259e (patch)
treeac9f256289cf716d162d7093a6efe1e6f48f87d3
parentfa7ebafb4aae584b246df1d3380658e808ea5d26 (diff)
downloadapifw-94e4b0766eb6f127c8d9d8d51cecfe404d8c259e.tar.gz
Drop: unwanted logging
-rw-r--r--apifw/bottleapp.py11
1 files changed, 4 insertions, 7 deletions
diff --git a/apifw/bottleapp.py b/apifw/bottleapp.py
index 7e1572d..37cc5b0 100644
--- a/apifw/bottleapp.py
+++ b/apifw/bottleapp.py
@@ -112,6 +112,10 @@ class BottleAuthorizationPlugin:
claims = self.get_token_claims()
kwargs['claims'] = claims
self.assert_authorized(route, claims)
+ logging.debug(
+ 'Route requires and has authz, claims: %r', claims)
+ else:
+ logging.debug('Route does NOT require authz')
return callback(*args, **kwargs)
return wrapper
@@ -140,7 +144,6 @@ class BottleAuthorizationPlugin:
if not value:
self.raise_unauthorized(
'no_authorization', 'No Authorization header')
- logging.debug('Request has Authorization header: %r', value)
return value
def parse_authorization_header(self, value):
@@ -148,15 +151,11 @@ class BottleAuthorizationPlugin:
if len(words) != 2 or words[0].lower() != 'bearer':
self.raise_unauthorized(
'bad_authorization', 'Authorization should be "Bearer TOKEN"')
- logging.debug(
- 'Request Authorization header looks like a bearer token: good')
return words[1]
def parse_token(self, token):
try:
token = apifw.decode_token(token, self.pubkey, audience=self.aud)
- logging.debug('Request Authorization token can be decoded: good')
- logging.debug('Token: %r', token)
return token
except jwt.InvalidTokenError as e:
self.raise_unauthorized('invalid_token', str(e))
@@ -172,8 +171,6 @@ class BottleAuthorizationPlugin:
scopes = claim_scopes.split(' ')
route_scope = self.get_scope_for_route(route['method'], route['rule'])
if route_scope in scopes:
- logging.debug(
- 'Route scope %s is in scopes %r', route_scope, scopes)
return True
logging.error(
'Route scope %s is NOT in scopes %r', route_scope, scopes)