diff --git a/src/djangooidc/oidc.py b/src/djangooidc/oidc.py index 331490cae..87592d8e1 100644 --- a/src/djangooidc/oidc.py +++ b/src/djangooidc/oidc.py @@ -87,7 +87,7 @@ class Client(oic.Client): extra_args=None, ): """Step 2: Construct a login URL at OP's domain and send the user to it.""" - logger.info("create_authn_request() Creating the OpenID Connect authn request...") + logger.debug("create_authn_request() Creating the OpenID Connect authn request...") state = rndstr(size=32) try: session["state"] = state @@ -112,7 +112,7 @@ class Client(oic.Client): logger.error("Failed to assemble request arguments for %s" % state) raise o_e.InternalError(locator=state) - logger.info("request args: %s" % request_args) + logger.debug("request args: %s" % request_args) try: # prepare the request for sending @@ -126,9 +126,9 @@ class Client(oic.Client): method="GET", request_args=request_args, ) - logger.info("body: %s" % body) - logger.info("URL: %s" % url) - logger.info("headers: %s" % headers) + logger.debug("body: %s" % body) + logger.debug("URL: %s" % url) + logger.debug("headers: %s" % headers) except Exception as err: logger.error(err) logger.error("Failed to prepare request for %s" % state) @@ -150,7 +150,7 @@ class Client(oic.Client): def callback(self, unparsed_response, session): """Step 3: Receive OP's response, request an access token, and user info.""" - logger.info("callback() Processing the OpenID Connect callback response...") + logger.debug("callback() Processing the OpenID Connect callback response...") state = session.get("state", "") try: # parse the response from OP @@ -174,7 +174,7 @@ class Client(oic.Client): logger.error("Unable to process response %s for %s" % (error, state)) raise o_e.AuthenticationFailed(locator=state) - logger.info("callback() authn_response %s" % authn_response) + logger.debug("callback() authn_response %s" % authn_response) if not authn_response.get("state", None): logger.error("State value not received from OP for %s" % state) @@ -213,7 +213,7 @@ class Client(oic.Client): logger.error("Unable to get user info (%s) for %s" % (info_response.get("error", ""), state)) raise o_e.AuthenticationFailed(locator=state) - logger.info("_get_user_info() user info: %s" % info_response) + logger.debug("_get_user_info() user info: %s" % info_response) return info_response.to_dict() diff --git a/src/djangooidc/views.py b/src/djangooidc/views.py index a39da68aa..e7151d8a3 100644 --- a/src/djangooidc/views.py +++ b/src/djangooidc/views.py @@ -72,23 +72,9 @@ def login_callback(request): # test for need for identity verification and if it is satisfied # if not satisfied, redirect user to login with stepped up acr_value if requires_step_up_auth(userinfo): - logger.info("login_callback() calls get_step_up_acr_value and create_authn_request in oidc") # add acr_value to request.session request.session["acr_value"] = CLIENT.get_step_up_acr_value() return CLIENT.create_authn_request(request.session) - - logger.info(f"login_callback() before calling authenticate: {userinfo}") - - try: - user_in_db = User.objects.get(username=userinfo["sub"]) - - if user_in_db: - logger.info( - f"This user exists in the DB (before authenticate): {user_in_db.first_name} {user_in_db.last_name}" - ) - except: - pass - user = authenticate(request=request, **userinfo) if user: login(request, user)