Skip to content

Commit 6b3a960

Browse files
committed
Upstream code uses [Token] for logs, let's not change that
1 parent 7586ed2 commit 6b3a960

File tree

1 file changed

+16
-13
lines changed

1 file changed

+16
-13
lines changed

oidc_provider/lib/endpoints/token.py

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ def validate_params(self):
5757
self.client = Client.objects.get(client_id=self.params["client_id"])
5858
except Client.DoesNotExist:
5959
logger.info(
60-
"[OIDC:Token] Client does not exist: %s",
60+
"[Token] Client does not exist: %s",
6161
self.params["client_id"],
6262
extra=log_extra,
6363
)
@@ -66,7 +66,7 @@ def validate_params(self):
6666
if self.client.client_type == "confidential":
6767
if not (self.client.client_secret == self.params["client_secret"]):
6868
logger.info(
69-
"[OIDC:Token] Invalid client secret: client %s do not have secret %s",
69+
"[Token] Invalid client secret: client %s do not have secret %s",
7070
self.client.client_id,
7171
self.client.client_secret,
7272
extra=log_extra,
@@ -76,7 +76,7 @@ def validate_params(self):
7676
if self.params["grant_type"] == "authorization_code":
7777
if self.params["redirect_uri"] not in self.client.redirect_uris:
7878
logger.info(
79-
"[OIDC:Token] Invalid redirect uri: %s",
79+
"[Token] Invalid redirect uri: %s",
8080
self.params["redirect_uri"],
8181
extra=log_extra,
8282
)
@@ -88,30 +88,33 @@ def validate_params(self):
8888
)
8989
except DatabaseError:
9090
logger.info(
91-
"[OIDC:Token] Code cannot be reused: %s",
91+
"[Token] Code cannot be reused: %s",
9292
self.params["code"],
9393
extra=log_extra,
9494
)
9595
raise TokenError("invalid_grant")
9696
except Code.DoesNotExist:
9797
logger.info(
98-
"[OIDC:Token] Code does not exist: %s",
98+
"[Token] Code does not exist: %s",
9999
self.params["code"],
100100
extra=log_extra,
101101
)
102102
raise TokenError("invalid_grant")
103103

104+
# Log the id instead of the code itself to reduce leak risk. We can look it up.
105+
log_extra["code_id"] = self.code.id
106+
104107
if not (self.code.client == self.client) or self.code.has_expired():
105108
logger.info(
106-
"[OIDC:Token] Invalid code: invalid client or code has expired",
109+
"[Token] Invalid code: invalid client or code has expired",
107110
extra=log_extra,
108111
)
109112
raise TokenError("invalid_grant")
110113

111114
# Validate PKCE parameters.
112115
if self.code.code_challenge:
113116
if self.params["code_verifier"] is None:
114-
logger.info("[OIDC:Token] Missing code_verifier", extra=log_extra)
117+
logger.info("[Token] Missing code_verifier", extra=log_extra)
115118
raise TokenError("invalid_grant")
116119

117120
if self.code.code_challenge_method == "S256":
@@ -128,7 +131,7 @@ def validate_params(self):
128131
# TODO: We should explain the error.
129132
if not (new_code_challenge == self.code.code_challenge):
130133
logger.info(
131-
"[OIDC:Token] code verifier did not match code challenge",
134+
"[Token] code verifier did not match code challenge",
132135
extra=log_extra,
133136
)
134137
raise TokenError("invalid_grant")
@@ -154,7 +157,7 @@ def validate_params(self):
154157

155158
elif self.params["grant_type"] == "refresh_token":
156159
if not self.params["refresh_token"]:
157-
logger.info("[OIDC:Token] Missing refresh token")
160+
logger.info("[Token] Missing refresh token")
158161
raise TokenError("invalid_grant")
159162

160163
try:
@@ -164,15 +167,15 @@ def validate_params(self):
164167

165168
except Token.DoesNotExist:
166169
logger.info(
167-
"[OIDC:Token] Refresh token does not exist: %s", self.params["refresh_token"]
170+
"[Token] Refresh token does not exist: %s", self.params["refresh_token"]
168171
)
169172
raise TokenError("invalid_grant")
170173
elif self.params["grant_type"] == "client_credentials":
171174
if not self.client._scope:
172-
logger.info("[OIDC:Token] Client using client credentials with empty scope")
175+
logger.info("[Token] Client using client credentials with empty scope")
173176
raise TokenError("invalid_scope")
174177
else:
175-
logger.info("[OIDC:Token] Invalid grant type: %s", self.params["grant_type"])
178+
logger.info("[Token] Invalid grant type: %s", self.params["grant_type"])
176179
raise TokenError("unsupported_grant_type")
177180

178181
def validate_requested_scopes(self):
@@ -189,7 +192,7 @@ def validate_requested_scopes(self):
189192
token_scopes.append(scope_requested)
190193
else:
191194
logger.error(
192-
"[OIDC:Token] The request scope %s is not supported by client %s",
195+
"[Token] The request scope %s is not supported by client %s",
193196
scope_requested,
194197
self.client.client_id,
195198
)

0 commit comments

Comments
 (0)