*: remove some very verbose logging messages

Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
Jens Langhammer 2022-08-17 13:36:56 +02:00
parent 48fb3c98ff
commit 846b63a17b
4 changed files with 3 additions and 12 deletions

View file

@ -70,7 +70,6 @@ class PolicyAccessView(AccessMixin, View):
# Check if user is unauthenticated, so we pass the application # Check if user is unauthenticated, so we pass the application
# for the identification stage # for the identification stage
if not request.user.is_authenticated: if not request.user.is_authenticated:
LOGGER.warning("user not authenticated")
return self.handle_no_permission() return self.handle_no_permission()
# Check permissions # Check permissions
result = self.user_has_access() result = self.user_has_access()

View file

@ -24,12 +24,7 @@ from authentik.flows.challenge import (
HttpChallengeResponse, HttpChallengeResponse,
) )
from authentik.flows.models import in_memory_stage from authentik.flows.models import in_memory_stage
from authentik.flows.planner import ( from authentik.flows.planner import PLAN_CONTEXT_APPLICATION, PLAN_CONTEXT_SSO, FlowPlanner
PLAN_CONTEXT_APPLICATION,
PLAN_CONTEXT_SSO,
FlowPlan,
FlowPlanner,
)
from authentik.flows.stage import StageView from authentik.flows.stage import StageView
from authentik.flows.views.executor import SESSION_KEY_PLAN from authentik.flows.views.executor import SESSION_KEY_PLAN
from authentik.lib.utils.time import timedelta_from_string from authentik.lib.utils.time import timedelta_from_string
@ -353,7 +348,7 @@ class AuthorizationFlowInitView(PolicyAccessView):
# planner.use_cache = False # planner.use_cache = False
planner.allow_empty_flows = True planner.allow_empty_flows = True
scope_descriptions = UserInfoView().get_scope_descriptions(self.params.scope) scope_descriptions = UserInfoView().get_scope_descriptions(self.params.scope)
plan: FlowPlan = planner.plan( plan = planner.plan(
self.request, self.request,
{ {
PLAN_CONTEXT_SSO: True, PLAN_CONTEXT_SSO: True,

View file

@ -66,10 +66,9 @@ func NewProxyServer(ac *ak.APIController) *ProxyServer {
} }
func (ps *ProxyServer) HandleHost(rw http.ResponseWriter, r *http.Request) bool { func (ps *ProxyServer) HandleHost(rw http.ResponseWriter, r *http.Request) bool {
a, host := ps.lookupApp(r) a, _ := ps.lookupApp(r)
if a != nil { if a != nil {
if a.Mode() == api.PROXYMODE_PROXY { if a.Mode() == api.PROXYMODE_PROXY {
ps.log.WithField("host", host).Trace("routing to proxy outpost")
a.ServeHTTP(rw, r) a.ServeHTTP(rw, r)
return true return true
} }

View file

@ -11,7 +11,6 @@ import (
"github.com/prometheus/client_golang/prometheus" "github.com/prometheus/client_golang/prometheus"
"goauthentik.io/internal/outpost/proxyv2/application" "goauthentik.io/internal/outpost/proxyv2/application"
"goauthentik.io/internal/utils/sentry" "goauthentik.io/internal/utils/sentry"
"goauthentik.io/internal/utils/web"
) )
func (ws *WebServer) configureProxy() { func (ws *WebServer) configureProxy() {
@ -65,7 +64,6 @@ func (ws *WebServer) configureProxy() {
Requests.With(prometheus.Labels{ Requests.With(prometheus.Labels{
"dest": "py", "dest": "py",
}).Observe(float64(time.Since(before))) }).Observe(float64(time.Since(before)))
ws.log.WithField("host", web.GetHost(r)).Trace("routing to application server")
rp.ServeHTTP(rw, r) rp.ServeHTTP(rw, r)
})) }))
} }