|
2 | 2 | from base64 import urlsafe_b64encode
|
3 | 3 |
|
4 | 4 | from satosa.context import Context
|
5 |
| - |
6 | 5 | from .base import RequestMicroService
|
7 | 6 | from ..exception import SATOSAConfigurationError
|
8 | 7 | from ..exception import SATOSAError
|
9 | 8 |
|
| 9 | + |
10 | 10 | logger = logging.getLogger(__name__)
|
11 | 11 |
|
12 | 12 |
|
@@ -62,32 +62,37 @@ def _b64_url(self, data):
|
62 | 62 | def process(self, context, data):
|
63 | 63 | target_entity_id = context.get_decoration(Context.KEY_TARGET_ENTITYID)
|
64 | 64 | if None is target_entity_id:
|
65 |
| - msg_tpl = "{name} can only be used when a target entityid is set" |
66 |
| - msg = msg_tpl.format(name=self.__class__.__name__) |
| 65 | + msg = "{name} can only be used when a target entityid is set".format( |
| 66 | + name=self.__class__.__name__ |
| 67 | + ) |
67 | 68 | logger.error(msg)
|
68 | 69 | raise SATOSAError(msg)
|
69 | 70 |
|
70 | 71 | target_specific_rules = self.rules.get(target_entity_id)
|
71 | 72 | # default to allowing everything if there are no specific rules
|
72 | 73 | if not target_specific_rules:
|
73 |
| - logging.debug("Requester '%s' allowed by default to target entity '%s' due to no entity specific rules", |
74 |
| - data.requester, target_entity_id) |
| 74 | + logger.debug("Requester '{}' allowed by default to target entity '{}' due to no entity specific rules".format( |
| 75 | + data.requester, target_entity_id |
| 76 | + )) |
75 | 77 | return super().process(context, data)
|
76 | 78 |
|
77 | 79 | # deny rules takes precedence
|
78 | 80 | deny_rules = target_specific_rules.get("deny", [])
|
79 | 81 | if data.requester in deny_rules:
|
80 |
| - logging.debug("Requester '%s' is not allowed by target entity '%s' due to deny rules '%s'", data.requester, |
81 |
| - target_entity_id, deny_rules) |
| 82 | + logger.debug("Requester '{}' is not allowed by target entity '{}' due to deny rules '{}'".format( |
| 83 | + data.requester, target_entity_id, deny_rules |
| 84 | + )) |
82 | 85 | raise SATOSAError("Requester is not allowed by target provider")
|
83 | 86 |
|
84 | 87 | allow_rules = target_specific_rules.get("allow", [])
|
85 | 88 | allow_all = "*" in allow_rules
|
86 | 89 | if data.requester in allow_rules or allow_all:
|
87 |
| - logging.debug("Requester '%s' allowed by target entity '%s' due to allow rules '%s", |
88 |
| - data.requester, target_entity_id, allow_rules) |
| 90 | + logger.debug("Requester '{}' allowed by target entity '{}' due to allow rules '{}".format( |
| 91 | + data.requester, target_entity_id, allow_rules |
| 92 | + )) |
89 | 93 | return super().process(context, data)
|
90 | 94 |
|
91 |
| - logger.debug("Requester '%s' is not allowed by target entity '%s' due to final deny all rule in '%s'", |
92 |
| - data.requester, target_entity_id, deny_rules) |
| 95 | + logger.debug("Requester '{}' is not allowed by target entity '{}' due to final deny all rule in '{}'".format( |
| 96 | + data.requester, target_entity_id, deny_rules |
| 97 | + )) |
93 | 98 | raise SATOSAError("Requester is not allowed by target provider")
|
0 commit comments