diff --git a/backend/web/login/login.py b/backend/web/login/login.py index 7034eb9e6f61cb2d74757151e0679d892813597a..6198d85140b5ff0b95f473dc9e361fa089f17bc1 100644 --- a/backend/web/login/login.py +++ b/backend/web/login/login.py @@ -131,6 +131,7 @@ def login(): """ # Check if we are logged in: + current_app.logger.info("/login: get_auth") (identity, auth_response) = get_auth() # We ignore the potential `auth_response` in this case: that's for telling # the user they have to upgrade their session to include a second factor, @@ -205,6 +206,7 @@ def login(): # If we do not have a flow, get one. if not flow: + current_app.logger.info("No flow found. Redirecting to Kratos to obtain one.") return redirect(KRATOS_PUBLIC_URL + "self-service/login/browser") # If we end up here, then either: @@ -249,6 +251,7 @@ def auth(): abort(400, description="Challenge required when requesting authorization") # Check if we are logged in: + current_app.logger.info("/auth: get_auth") (identity, auth_response) = get_auth() if auth_response is not None: @@ -532,7 +535,7 @@ def get_auth(): current_app.logger.info("Error in to_session: {}".format(body)) error_id = body.get('error', {}).get('id') if error_id == 'session_aal2_required': - current_app.logger.info("2FA requested by Kratos. Redirecting the user.") + current_app.logger.info("2FA requested by Kratos. Suggesting to redirect the user.") redirect_url = body.get('redirect_browser_to') if redirect_url is None: response = None