You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airavata.apache.org by ma...@apache.org on 2020/05/11 15:36:42 UTC
[airavata-django-portal] 03/05: Revert "AIRAVATA-3331 Mask
client_secret out of error emails"
This is an automated email from the ASF dual-hosted git repository.
machristie pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/airavata-django-portal.git
commit 74af728e90e80f3ed412905cd66973cef88a2c77
Author: Marcus Christie <ma...@apache.org>
AuthorDate: Mon May 11 11:15:47 2020 -0400
Revert "AIRAVATA-3331 Mask client_secret out of error emails"
This reverts commit e2f62c61d47edcef1a189ae39cd33e385372509e.
---
django_airavata/apps/auth/backends.py | 3 ---
1 file changed, 3 deletions(-)
diff --git a/django_airavata/apps/auth/backends.py b/django_airavata/apps/auth/backends.py
index 98bf55a..bca2881 100644
--- a/django_airavata/apps/auth/backends.py
+++ b/django_airavata/apps/auth/backends.py
@@ -61,7 +61,6 @@ class KeycloakBackend(object):
except User.DoesNotExist:
return None
- @sensitive_variables('client_secret')
def _get_token_and_userinfo_password_flow(self, username, password):
try:
client_id = settings.KEYCLOAK_CLIENT_ID
@@ -87,7 +86,6 @@ class KeycloakBackend(object):
f"password: {e}")
return None, None
- @sensitive_variables('client_secret')
def _get_token_and_userinfo_redirect_flow(self, request):
authorization_code_url = request.build_absolute_uri()
client_id = settings.KEYCLOAK_CLIENT_ID
@@ -110,7 +108,6 @@ class KeycloakBackend(object):
userinfo = oauth2_session.get(userinfo_url).json()
return token, userinfo
- @sensitive_variables('client_secret', 'auth')
def _get_token_and_userinfo_from_refresh_token(self,
request,
refresh_token=None):