aboutsummaryrefslogtreecommitdiff
path: root/rhodecode/lib/auth.py
diff options
context:
space:
mode:
Diffstat (limited to 'rhodecode/lib/auth.py')
-rw-r--r--rhodecode/lib/auth.py36
1 files changed, 18 insertions, 18 deletions
diff --git a/rhodecode/lib/auth.py b/rhodecode/lib/auth.py
index 07f8fcc9..21b457b2 100644
--- a/rhodecode/lib/auth.py
+++ b/rhodecode/lib/auth.py
@@ -177,10 +177,10 @@ def authenticate(username, password):
elif user.username == username and check_password(password,
user.password):
- log.info('user %s authenticated correctly', username)
+ log.info('user %s authenticated correctly' % username)
return True
else:
- log.warning('user %s is disabled', username)
+ log.warning('user %s is disabled' % username)
else:
log.debug('Regular authentication failed')
@@ -214,7 +214,7 @@ def authenticate(username, password):
aldap = AuthLdap(**kwargs)
(user_dn, ldap_attrs) = aldap.authenticate_ldap(username,
password)
- log.debug('Got ldap DN response %s', user_dn)
+ log.debug('Got ldap DN response %s' % user_dn)
get_ldap_attr = lambda k: ldap_attrs.get(ldap_settings\
.get(k), [''])[0]
@@ -227,7 +227,7 @@ def authenticate(username, password):
if user_model.create_ldap(username, password, user_dn,
user_attrs):
- log.info('created new ldap user %s', username)
+ log.info('created new ldap user %s' % username)
Session.commit()
return True
@@ -250,7 +250,7 @@ def login_container_auth(username):
user = UserModel().create_for_container_auth(username, user_attrs)
if not user:
return None
- log.info('User %s was created by container authentication', username)
+ log.info('User %s was created by container authentication' % username)
if not user.active:
return None
@@ -277,7 +277,7 @@ def get_container_username(environ, config):
# Removing realm and domain from username
username = username.partition('@')[0]
username = username.rpartition('\\')[2]
- log.debug('Received username %s from container', username)
+ log.debug('Received username %s from container' % username)
return username
@@ -315,18 +315,18 @@ class AuthUser(object):
# try go get user by api key
if self._api_key and self._api_key != self.anonymous_user.api_key:
- log.debug('Auth User lookup by API KEY %s', self._api_key)
+ log.debug('Auth User lookup by API KEY %s' % self._api_key)
is_user_loaded = user_model.fill_data(self, api_key=self._api_key)
# lookup by userid
elif (self.user_id is not None and
self.user_id != self.anonymous_user.user_id):
- log.debug('Auth User lookup by USER ID %s', self.user_id)
+ log.debug('Auth User lookup by USER ID %s' % self.user_id)
is_user_loaded = user_model.fill_data(self, user_id=self.user_id)
# lookup by username
elif self.username and \
str2bool(config.get('container_auth_enabled', False)):
- log.debug('Auth User lookup by USER NAME %s', self.username)
+ log.debug('Auth User lookup by USER NAME %s' % self.username)
dbuser = login_container_auth(self.username)
if dbuser is not None:
for k, v in dbuser.get_dict().items():
@@ -348,7 +348,7 @@ class AuthUser(object):
if not self.username:
self.username = 'None'
- log.debug('Auth User is now %s', self)
+ log.debug('Auth User is now %s' % self)
user_model.fill_perms(self)
@property
@@ -422,21 +422,21 @@ class LoginRequired(object):
api_access_ok = False
if self.api_access:
- log.debug('Checking API KEY access for %s', cls)
+ log.debug('Checking API KEY access for %s' % cls)
if user.api_key == request.GET.get('api_key'):
api_access_ok = True
else:
log.debug("API KEY token not valid")
- log.debug('Checking if %s is authenticated @ %s', user.username, cls)
+ log.debug('Checking if %s is authenticated @ %s' % (user.username, cls))
if user.is_authenticated or api_access_ok:
- log.debug('user %s is authenticated', user.username)
+ log.debug('user %s is authenticated' % user.username)
return func(*fargs, **fkwargs)
else:
- log.warn('user %s NOT authenticated', user.username)
+ log.warn('user %s NOT authenticated' % user.username)
p = url.current()
- log.debug('redirecting to login page with %s', p)
+ log.debug('redirecting to login page with %s' % p)
return redirect(url('login_home', came_from=p))
@@ -452,7 +452,7 @@ class NotAnonymous(object):
cls = fargs[0]
self.user = cls.rhodecode_user
- log.debug('Checking if user is not anonymous @%s', cls)
+ log.debug('Checking if user is not anonymous @%s' % cls)
anonymous = self.user.username == 'default'
@@ -491,11 +491,11 @@ class PermsDecorator(object):
self.user)
if self.check_permissions():
- log.debug('Permission granted for %s %s', cls, self.user)
+ log.debug('Permission granted for %s %s' % (cls, self.user))
return func(*fargs, **fkwargs)
else:
- log.warning('Permission denied for %s %s', cls, self.user)
+ log.warning('Permission denied for %s %s' % (cls, self.user))
anonymous = self.user.username == 'default'
if anonymous: