diff options
Diffstat (limited to 'src/rgw')
-rw-r--r-- | src/rgw/rgw_auth_keystone.cc | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/src/rgw/rgw_auth_keystone.cc b/src/rgw/rgw_auth_keystone.cc index 5602025d42c..607a611f778 100644 --- a/src/rgw/rgw_auth_keystone.cc +++ b/src/rgw/rgw_auth_keystone.cc @@ -101,8 +101,6 @@ TokenEngine::get_from_keystone(const std::string& token) const /* NULL terminate for debug output. */ token_body_bl.append(static_cast<char>(0)); - ldout(cct, 20) << "received response status=" << validate.get_http_status() - << ", body=" << token_body_bl.c_str() << dendl; /* Detect Keystone rejection earlier than during the token parsing. * Although failure at the parsing phase doesn't impose a threat, @@ -114,9 +112,14 @@ TokenEngine::get_from_keystone(const std::string& token) const validate.get_http_status() == /* Most likely: non-existent token supplied by the client. */ RGWValidateKeystoneToken::HTTP_STATUS_NOTFOUND) { + ldout(cct, 5) << "Failed keystone auth from " << url << " with " + << validate.get_http_status() << dendl; return boost::none; } + ldout(cct, 20) << "received response status=" << validate.get_http_status() + << ", body=" << token_body_bl.c_str() << dendl; + TokenEngine::token_envelope_t token_body; ret = token_body.parse(cct, token, token_body_bl, config.get_api_version()); if (ret < 0) { |