From d5031380b55e1d54914f9803213b2114766031a6 Mon Sep 17 00:00:00 2001 From: Dylan Turnbull Date: Fri, 16 Apr 2021 16:49:55 -0500 Subject: [PATCH] updated the logger format to match what was actually requested --- src/node/http.ts | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/node/http.ts b/src/node/http.ts index 4107013148b6..ac1045731ce2 100644 --- a/src/node/http.ts +++ b/src/node/http.ts @@ -73,7 +73,7 @@ export const authenticated = (req: express.Request): boolean => { ) case AuthType.Openid: if (req.oidc.isAuthenticated()) { - logger.debug(`User is authenticated using OpenID Connect\n${req.oidc.user}`) + logger.debug("User authenticated with OpenID Connect", field("user", req.oidc.user)) // Check to see if a group claim was specified. // If there was no group claim specified the user will be considered authorized. @@ -87,7 +87,7 @@ export const authenticated = (req: express.Request): boolean => { if (key === req.args["openid-group-claim"] && req.args["openid-group-claim"].value) { for (const value in claims) { if (req.args["openid-user-group"] === claims[value]) { - logger.debug(`User is authorized!\n${req.oidc.user}`) + logger.debug("User authorized", field("user", req.oidc.user)) return true } } @@ -95,13 +95,13 @@ export const authenticated = (req: express.Request): boolean => { } // Throw an error informing the user that they're unauthorized. - logger.debug(`User is not authorized!\n${req.oidc.user}`) + logger.debug("User not authorized", field("user", req.oidc.user)) throw new HttpError("Unauthorized", HttpCode.Unauthorized) } // Returning false means the user isn't authenticated. // This should trigger a redirect so the user can get authenticated. - logger.debug(`User is not authenticated using OpenID Connect\n${req.oidc.user}`) + logger.debug("User not authenticated using OpenID Connect", field("user", req.oidc.user)) return false default: