@@ -52,6 +52,11 @@ def add_parameter(self: "BrowserAzureCredentialsProvider", info: RedshiftPropert
5252
5353 self .idp_response_timeout = info .idp_response_timeout
5454
55+ _logger .debug ("Idp_tenant={}" .format (self .idp_tenant ))
56+ _logger .debug ("Client_id={}" .format (self .client_id ))
57+ _logger .debug ("Idp_response_timeout={}" .format (self .idp_response_timeout ))
58+ _logger .debug ("Listen_port={}" .format (self .listen_port ))
59+
5560 # Required method to grab the SAML Response. Used in base class to refresh temporary credentials.
5661 def get_saml_assertion (self : "BrowserAzureCredentialsProvider" ) -> str :
5762
@@ -65,6 +70,7 @@ def get_saml_assertion(self: "BrowserAzureCredentialsProvider") -> str:
6570
6671 listen_socket : socket .socket = self .get_listen_socket ()
6772 self .redirectUri = "http://localhost:{port}/redshift/" .format (port = self .listen_port )
73+ _logger .debug ("Listening for connection on port {}" .format (self .listen_port ))
6874
6975 try :
7076 token : str = self .fetch_authorization_token (listen_socket )
@@ -73,7 +79,7 @@ def get_saml_assertion(self: "BrowserAzureCredentialsProvider") -> str:
7379 raise e
7480 finally :
7581 listen_socket .close ()
76-
82+ _logger . debug ( "Got SAML assertion" )
7783 return self .wrap_and_encode_assertion (saml_assertion )
7884
7985 # First authentication phase:
@@ -93,10 +99,10 @@ def fetch_authorization_token(self: "BrowserAzureCredentialsProvider", listen_so
9399
94100 return str (return_value )
95101 except socket .error as e :
96- _logger .error ("socket error: %s" , e )
102+ _logger .error ("Socket error: %s" , e )
97103 raise e
98104 except Exception as e :
99- _logger .error ("other Exception: %s" , e )
105+ _logger .error ("Other Exception: %s" , e )
100106 raise e
101107
102108 # Initiates the request to the IDP and gets the response body
@@ -119,14 +125,17 @@ def fetch_saml_response(self: "BrowserAzureCredentialsProvider", token):
119125 "client_secret" : self .client_secret ,
120126 "redirect_uri" : self .redirectUri ,
121127 }
128+
129+ _logger .debug ("Uri: {}" .format (url ))
130+
122131 try :
123132 response = requests .post (url , data = payload , headers = headers , verify = self .do_verify_ssl_cert ())
124133 response .raise_for_status ()
125134 except requests .exceptions .HTTPError as e :
126135 if "response" in vars ():
127- _logger .debug ("fetch_saml_response https response: {}" .format (response .text )) # type: ignore
136+ _logger .debug ("Fetch_saml_response https response: {}" .format (response .content )) # type: ignore
128137 else :
129- _logger .debug ("fetch_saml_response could not receive https response due to an error" )
138+ _logger .debug ("Fetch_saml_response could not receive https response due to an error" )
130139 _logger .error ("Request for authentication from Microsoft was unsuccessful. {}" .format (str (e )))
131140 raise InterfaceError (e )
132141 except requests .exceptions .Timeout as e :
@@ -141,6 +150,8 @@ def fetch_saml_response(self: "BrowserAzureCredentialsProvider", token):
141150 _logger .error ("A unknown error occurred when requesting authentication from Azure" )
142151 raise InterfaceError (e )
143152
153+ _logger .debug (response .text )
154+
144155 try :
145156 saml_assertion : str = response .json ()["access_token" ]
146157 except TypeError as e :
0 commit comments