@@ -57,7 +57,7 @@ def validate_params(self):
5757 self .client = Client .objects .get (client_id = self .params ["client_id" ])
5858 except Client .DoesNotExist :
5959 logger .info (
60- "[OIDC: Token] Client does not exist: %s" ,
60+ "[Token] Client does not exist: %s" ,
6161 self .params ["client_id" ],
6262 extra = log_extra ,
6363 )
@@ -66,7 +66,7 @@ def validate_params(self):
6666 if self .client .client_type == "confidential" :
6767 if not (self .client .client_secret == self .params ["client_secret" ]):
6868 logger .info (
69- "[OIDC: Token] Invalid client secret: client %s do not have secret %s" ,
69+ "[Token] Invalid client secret: client %s do not have secret %s" ,
7070 self .client .client_id ,
7171 self .client .client_secret ,
7272 extra = log_extra ,
@@ -76,7 +76,7 @@ def validate_params(self):
7676 if self .params ["grant_type" ] == "authorization_code" :
7777 if self .params ["redirect_uri" ] not in self .client .redirect_uris :
7878 logger .info (
79- "[OIDC: Token] Invalid redirect uri: %s" ,
79+ "[Token] Invalid redirect uri: %s" ,
8080 self .params ["redirect_uri" ],
8181 extra = log_extra ,
8282 )
@@ -88,30 +88,33 @@ def validate_params(self):
8888 )
8989 except DatabaseError :
9090 logger .info (
91- "[OIDC: Token] Code cannot be reused: %s" ,
91+ "[Token] Code cannot be reused: %s" ,
9292 self .params ["code" ],
9393 extra = log_extra ,
9494 )
9595 raise TokenError ("invalid_grant" )
9696 except Code .DoesNotExist :
9797 logger .info (
98- "[OIDC: Token] Code does not exist: %s" ,
98+ "[Token] Code does not exist: %s" ,
9999 self .params ["code" ],
100100 extra = log_extra ,
101101 )
102102 raise TokenError ("invalid_grant" )
103103
104+ # Log the id instead of the code itself to reduce leak risk. We can look it up.
105+ log_extra ["code_id" ] = self .code .id
106+
104107 if not (self .code .client == self .client ) or self .code .has_expired ():
105108 logger .info (
106- "[OIDC: Token] Invalid code: invalid client or code has expired" ,
109+ "[Token] Invalid code: invalid client or code has expired" ,
107110 extra = log_extra ,
108111 )
109112 raise TokenError ("invalid_grant" )
110113
111114 # Validate PKCE parameters.
112115 if self .code .code_challenge :
113116 if self .params ["code_verifier" ] is None :
114- logger .info ("[OIDC: Token] Missing code_verifier" , extra = log_extra )
117+ logger .info ("[Token] Missing code_verifier" , extra = log_extra )
115118 raise TokenError ("invalid_grant" )
116119
117120 if self .code .code_challenge_method == "S256" :
@@ -128,7 +131,7 @@ def validate_params(self):
128131 # TODO: We should explain the error.
129132 if not (new_code_challenge == self .code .code_challenge ):
130133 logger .info (
131- "[OIDC: Token] code verifier did not match code challenge" ,
134+ "[Token] code verifier did not match code challenge" ,
132135 extra = log_extra ,
133136 )
134137 raise TokenError ("invalid_grant" )
@@ -154,7 +157,7 @@ def validate_params(self):
154157
155158 elif self .params ["grant_type" ] == "refresh_token" :
156159 if not self .params ["refresh_token" ]:
157- logger .info ("[OIDC: Token] Missing refresh token" )
160+ logger .info ("[Token] Missing refresh token" )
158161 raise TokenError ("invalid_grant" )
159162
160163 try :
@@ -164,15 +167,15 @@ def validate_params(self):
164167
165168 except Token .DoesNotExist :
166169 logger .info (
167- "[OIDC: Token] Refresh token does not exist: %s" , self .params ["refresh_token" ]
170+ "[Token] Refresh token does not exist: %s" , self .params ["refresh_token" ]
168171 )
169172 raise TokenError ("invalid_grant" )
170173 elif self .params ["grant_type" ] == "client_credentials" :
171174 if not self .client ._scope :
172- logger .info ("[OIDC: Token] Client using client credentials with empty scope" )
175+ logger .info ("[Token] Client using client credentials with empty scope" )
173176 raise TokenError ("invalid_scope" )
174177 else :
175- logger .info ("[OIDC: Token] Invalid grant type: %s" , self .params ["grant_type" ])
178+ logger .info ("[Token] Invalid grant type: %s" , self .params ["grant_type" ])
176179 raise TokenError ("unsupported_grant_type" )
177180
178181 def validate_requested_scopes (self ):
@@ -189,7 +192,7 @@ def validate_requested_scopes(self):
189192 token_scopes .append (scope_requested )
190193 else :
191194 logger .error (
192- "[OIDC: Token] The request scope %s is not supported by client %s" ,
195+ "[Token] The request scope %s is not supported by client %s" ,
193196 scope_requested ,
194197 self .client .client_id ,
195198 )
0 commit comments