*: remove some very verbose logging messages
Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
This commit is contained in:
parent
48fb3c98ff
commit
846b63a17b
|
@ -70,7 +70,6 @@ class PolicyAccessView(AccessMixin, View):
|
||||||
# Check if user is unauthenticated, so we pass the application
|
# Check if user is unauthenticated, so we pass the application
|
||||||
# for the identification stage
|
# for the identification stage
|
||||||
if not request.user.is_authenticated:
|
if not request.user.is_authenticated:
|
||||||
LOGGER.warning("user not authenticated")
|
|
||||||
return self.handle_no_permission()
|
return self.handle_no_permission()
|
||||||
# Check permissions
|
# Check permissions
|
||||||
result = self.user_has_access()
|
result = self.user_has_access()
|
||||||
|
|
|
@ -24,12 +24,7 @@ from authentik.flows.challenge import (
|
||||||
HttpChallengeResponse,
|
HttpChallengeResponse,
|
||||||
)
|
)
|
||||||
from authentik.flows.models import in_memory_stage
|
from authentik.flows.models import in_memory_stage
|
||||||
from authentik.flows.planner import (
|
from authentik.flows.planner import PLAN_CONTEXT_APPLICATION, PLAN_CONTEXT_SSO, FlowPlanner
|
||||||
PLAN_CONTEXT_APPLICATION,
|
|
||||||
PLAN_CONTEXT_SSO,
|
|
||||||
FlowPlan,
|
|
||||||
FlowPlanner,
|
|
||||||
)
|
|
||||||
from authentik.flows.stage import StageView
|
from authentik.flows.stage import StageView
|
||||||
from authentik.flows.views.executor import SESSION_KEY_PLAN
|
from authentik.flows.views.executor import SESSION_KEY_PLAN
|
||||||
from authentik.lib.utils.time import timedelta_from_string
|
from authentik.lib.utils.time import timedelta_from_string
|
||||||
|
@ -353,7 +348,7 @@ class AuthorizationFlowInitView(PolicyAccessView):
|
||||||
# planner.use_cache = False
|
# planner.use_cache = False
|
||||||
planner.allow_empty_flows = True
|
planner.allow_empty_flows = True
|
||||||
scope_descriptions = UserInfoView().get_scope_descriptions(self.params.scope)
|
scope_descriptions = UserInfoView().get_scope_descriptions(self.params.scope)
|
||||||
plan: FlowPlan = planner.plan(
|
plan = planner.plan(
|
||||||
self.request,
|
self.request,
|
||||||
{
|
{
|
||||||
PLAN_CONTEXT_SSO: True,
|
PLAN_CONTEXT_SSO: True,
|
||||||
|
|
|
@ -66,10 +66,9 @@ func NewProxyServer(ac *ak.APIController) *ProxyServer {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (ps *ProxyServer) HandleHost(rw http.ResponseWriter, r *http.Request) bool {
|
func (ps *ProxyServer) HandleHost(rw http.ResponseWriter, r *http.Request) bool {
|
||||||
a, host := ps.lookupApp(r)
|
a, _ := ps.lookupApp(r)
|
||||||
if a != nil {
|
if a != nil {
|
||||||
if a.Mode() == api.PROXYMODE_PROXY {
|
if a.Mode() == api.PROXYMODE_PROXY {
|
||||||
ps.log.WithField("host", host).Trace("routing to proxy outpost")
|
|
||||||
a.ServeHTTP(rw, r)
|
a.ServeHTTP(rw, r)
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
|
@ -11,7 +11,6 @@ import (
|
||||||
"github.com/prometheus/client_golang/prometheus"
|
"github.com/prometheus/client_golang/prometheus"
|
||||||
"goauthentik.io/internal/outpost/proxyv2/application"
|
"goauthentik.io/internal/outpost/proxyv2/application"
|
||||||
"goauthentik.io/internal/utils/sentry"
|
"goauthentik.io/internal/utils/sentry"
|
||||||
"goauthentik.io/internal/utils/web"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func (ws *WebServer) configureProxy() {
|
func (ws *WebServer) configureProxy() {
|
||||||
|
@ -65,7 +64,6 @@ func (ws *WebServer) configureProxy() {
|
||||||
Requests.With(prometheus.Labels{
|
Requests.With(prometheus.Labels{
|
||||||
"dest": "py",
|
"dest": "py",
|
||||||
}).Observe(float64(time.Since(before)))
|
}).Observe(float64(time.Since(before)))
|
||||||
ws.log.WithField("host", web.GetHost(r)).Trace("routing to application server")
|
|
||||||
rp.ServeHTTP(rw, r)
|
rp.ServeHTTP(rw, r)
|
||||||
}))
|
}))
|
||||||
}
|
}
|
||||||
|
|
Reference in a new issue