@@ -57,7 +57,7 @@ def validate_params(self):
57
57
self .client = Client .objects .get (client_id = self .params ["client_id" ])
58
58
except Client .DoesNotExist :
59
59
logger .info (
60
- "[OIDC: Token] Client does not exist: %s" ,
60
+ "[Token] Client does not exist: %s" ,
61
61
self .params ["client_id" ],
62
62
extra = log_extra ,
63
63
)
@@ -66,7 +66,7 @@ def validate_params(self):
66
66
if self .client .client_type == "confidential" :
67
67
if not (self .client .client_secret == self .params ["client_secret" ]):
68
68
logger .info (
69
- "[OIDC: Token] Invalid client secret: client %s do not have secret %s" ,
69
+ "[Token] Invalid client secret: client %s do not have secret %s" ,
70
70
self .client .client_id ,
71
71
self .client .client_secret ,
72
72
extra = log_extra ,
@@ -76,7 +76,7 @@ def validate_params(self):
76
76
if self .params ["grant_type" ] == "authorization_code" :
77
77
if self .params ["redirect_uri" ] not in self .client .redirect_uris :
78
78
logger .info (
79
- "[OIDC: Token] Invalid redirect uri: %s" ,
79
+ "[Token] Invalid redirect uri: %s" ,
80
80
self .params ["redirect_uri" ],
81
81
extra = log_extra ,
82
82
)
@@ -88,30 +88,33 @@ def validate_params(self):
88
88
)
89
89
except DatabaseError :
90
90
logger .info (
91
- "[OIDC: Token] Code cannot be reused: %s" ,
91
+ "[Token] Code cannot be reused: %s" ,
92
92
self .params ["code" ],
93
93
extra = log_extra ,
94
94
)
95
95
raise TokenError ("invalid_grant" )
96
96
except Code .DoesNotExist :
97
97
logger .info (
98
- "[OIDC: Token] Code does not exist: %s" ,
98
+ "[Token] Code does not exist: %s" ,
99
99
self .params ["code" ],
100
100
extra = log_extra ,
101
101
)
102
102
raise TokenError ("invalid_grant" )
103
103
104
+ # Log the id instead of the code itself to reduce leak risk. We can look it up.
105
+ log_extra ["code_id" ] = self .code .id
106
+
104
107
if not (self .code .client == self .client ) or self .code .has_expired ():
105
108
logger .info (
106
- "[OIDC: Token] Invalid code: invalid client or code has expired" ,
109
+ "[Token] Invalid code: invalid client or code has expired" ,
107
110
extra = log_extra ,
108
111
)
109
112
raise TokenError ("invalid_grant" )
110
113
111
114
# Validate PKCE parameters.
112
115
if self .code .code_challenge :
113
116
if self .params ["code_verifier" ] is None :
114
- logger .info ("[OIDC: Token] Missing code_verifier" , extra = log_extra )
117
+ logger .info ("[Token] Missing code_verifier" , extra = log_extra )
115
118
raise TokenError ("invalid_grant" )
116
119
117
120
if self .code .code_challenge_method == "S256" :
@@ -128,7 +131,7 @@ def validate_params(self):
128
131
# TODO: We should explain the error.
129
132
if not (new_code_challenge == self .code .code_challenge ):
130
133
logger .info (
131
- "[OIDC: Token] code verifier did not match code challenge" ,
134
+ "[Token] code verifier did not match code challenge" ,
132
135
extra = log_extra ,
133
136
)
134
137
raise TokenError ("invalid_grant" )
@@ -154,7 +157,7 @@ def validate_params(self):
154
157
155
158
elif self .params ["grant_type" ] == "refresh_token" :
156
159
if not self .params ["refresh_token" ]:
157
- logger .info ("[OIDC: Token] Missing refresh token" )
160
+ logger .info ("[Token] Missing refresh token" )
158
161
raise TokenError ("invalid_grant" )
159
162
160
163
try :
@@ -164,15 +167,15 @@ def validate_params(self):
164
167
165
168
except Token .DoesNotExist :
166
169
logger .info (
167
- "[OIDC: Token] Refresh token does not exist: %s" , self .params ["refresh_token" ]
170
+ "[Token] Refresh token does not exist: %s" , self .params ["refresh_token" ]
168
171
)
169
172
raise TokenError ("invalid_grant" )
170
173
elif self .params ["grant_type" ] == "client_credentials" :
171
174
if not self .client ._scope :
172
- logger .info ("[OIDC: Token] Client using client credentials with empty scope" )
175
+ logger .info ("[Token] Client using client credentials with empty scope" )
173
176
raise TokenError ("invalid_scope" )
174
177
else :
175
- logger .info ("[OIDC: Token] Invalid grant type: %s" , self .params ["grant_type" ])
178
+ logger .info ("[Token] Invalid grant type: %s" , self .params ["grant_type" ])
176
179
raise TokenError ("unsupported_grant_type" )
177
180
178
181
def validate_requested_scopes (self ):
@@ -189,7 +192,7 @@ def validate_requested_scopes(self):
189
192
token_scopes .append (scope_requested )
190
193
else :
191
194
logger .error (
192
- "[OIDC: Token] The request scope %s is not supported by client %s" ,
195
+ "[Token] The request scope %s is not supported by client %s" ,
193
196
scope_requested ,
194
197
self .client .client_id ,
195
198
)
0 commit comments