From 94e4b0766eb6f127c8d9d8d51cecfe404d8c259e Mon Sep 17 00:00:00 2001 From: Lars Wirzenius Date: Tue, 28 Nov 2017 19:35:39 +0200 Subject: Drop: unwanted logging --- apifw/bottleapp.py | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-) diff --git a/apifw/bottleapp.py b/apifw/bottleapp.py index 7e1572d..37cc5b0 100644 --- a/apifw/bottleapp.py +++ b/apifw/bottleapp.py @@ -112,6 +112,10 @@ class BottleAuthorizationPlugin: claims = self.get_token_claims() kwargs['claims'] = claims self.assert_authorized(route, claims) + logging.debug( + 'Route requires and has authz, claims: %r', claims) + else: + logging.debug('Route does NOT require authz') return callback(*args, **kwargs) return wrapper @@ -140,7 +144,6 @@ class BottleAuthorizationPlugin: if not value: self.raise_unauthorized( 'no_authorization', 'No Authorization header') - logging.debug('Request has Authorization header: %r', value) return value def parse_authorization_header(self, value): @@ -148,15 +151,11 @@ class BottleAuthorizationPlugin: if len(words) != 2 or words[0].lower() != 'bearer': self.raise_unauthorized( 'bad_authorization', 'Authorization should be "Bearer TOKEN"') - logging.debug( - 'Request Authorization header looks like a bearer token: good') return words[1] def parse_token(self, token): try: token = apifw.decode_token(token, self.pubkey, audience=self.aud) - logging.debug('Request Authorization token can be decoded: good') - logging.debug('Token: %r', token) return token except jwt.InvalidTokenError as e: self.raise_unauthorized('invalid_token', str(e)) @@ -172,8 +171,6 @@ class BottleAuthorizationPlugin: scopes = claim_scopes.split(' ') route_scope = self.get_scope_for_route(route['method'], route['rule']) if route_scope in scopes: - logging.debug( - 'Route scope %s is in scopes %r', route_scope, scopes) return True logging.error( 'Route scope %s is NOT in scopes %r', route_scope, scopes) -- cgit v1.2.1