Skip to content

Commit 5805645

Browse files
Merge pull request #295 from sebulibah/micro_services.custom_routing-logger
Improve logging - satosa.micro_services.custom_routing
2 parents 2f4cc64 + 8740840 commit 5805645

File tree

1 file changed

+16
-11
lines changed

1 file changed

+16
-11
lines changed

src/satosa/micro_services/custom_routing.py

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
from base64 import urlsafe_b64encode
33

44
from satosa.context import Context
5-
65
from .base import RequestMicroService
76
from ..exception import SATOSAConfigurationError
87
from ..exception import SATOSAError
98

9+
1010
logger = logging.getLogger(__name__)
1111

1212

@@ -62,32 +62,37 @@ def _b64_url(self, data):
6262
def process(self, context, data):
6363
target_entity_id = context.get_decoration(Context.KEY_TARGET_ENTITYID)
6464
if None is target_entity_id:
65-
msg_tpl = "{name} can only be used when a target entityid is set"
66-
msg = msg_tpl.format(name=self.__class__.__name__)
65+
msg = "{name} can only be used when a target entityid is set".format(
66+
name=self.__class__.__name__
67+
)
6768
logger.error(msg)
6869
raise SATOSAError(msg)
6970

7071
target_specific_rules = self.rules.get(target_entity_id)
7172
# default to allowing everything if there are no specific rules
7273
if not target_specific_rules:
73-
logging.debug("Requester '%s' allowed by default to target entity '%s' due to no entity specific rules",
74-
data.requester, target_entity_id)
74+
logger.debug("Requester '{}' allowed by default to target entity '{}' due to no entity specific rules".format(
75+
data.requester, target_entity_id
76+
))
7577
return super().process(context, data)
7678

7779
# deny rules takes precedence
7880
deny_rules = target_specific_rules.get("deny", [])
7981
if data.requester in deny_rules:
80-
logging.debug("Requester '%s' is not allowed by target entity '%s' due to deny rules '%s'", data.requester,
81-
target_entity_id, deny_rules)
82+
logger.debug("Requester '{}' is not allowed by target entity '{}' due to deny rules '{}'".format(
83+
data.requester, target_entity_id, deny_rules
84+
))
8285
raise SATOSAError("Requester is not allowed by target provider")
8386

8487
allow_rules = target_specific_rules.get("allow", [])
8588
allow_all = "*" in allow_rules
8689
if data.requester in allow_rules or allow_all:
87-
logging.debug("Requester '%s' allowed by target entity '%s' due to allow rules '%s",
88-
data.requester, target_entity_id, allow_rules)
90+
logger.debug("Requester '{}' allowed by target entity '{}' due to allow rules '{}".format(
91+
data.requester, target_entity_id, allow_rules
92+
))
8993
return super().process(context, data)
9094

91-
logger.debug("Requester '%s' is not allowed by target entity '%s' due to final deny all rule in '%s'",
92-
data.requester, target_entity_id, deny_rules)
95+
logger.debug("Requester '{}' is not allowed by target entity '{}' due to final deny all rule in '{}'".format(
96+
data.requester, target_entity_id, deny_rules
97+
))
9398
raise SATOSAError("Requester is not allowed by target provider")

0 commit comments

Comments
 (0)