From abed41d390f39060590abce561bd8b5c39d1a74c Mon Sep 17 00:00:00 2001 From: James Laska Date: Thu, 5 Nov 2015 09:50:08 -0500 Subject: [PATCH] Reword log msgs for enterprise_auth failures --- awx/main/backend.py | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/awx/main/backend.py b/awx/main/backend.py index 52309ed263..751ca7bbe3 100644 --- a/awx/main/backend.py +++ b/awx/main/backend.py @@ -53,7 +53,7 @@ class LDAPBackend(BaseLDAPBackend): if not self.settings.SERVER_URI: return None if not feature_enabled('ldap'): - logger.error("LDAP authenticate failed for missing license feature") + logger.error("Unable to authenticate, license does not support LDAP authentication") return None return super(LDAPBackend, self).authenticate(username, password) @@ -61,7 +61,7 @@ class LDAPBackend(BaseLDAPBackend): if not self.settings.SERVER_URI: return None if not feature_enabled('ldap'): - logger.error("LDAP get_user failed for missing license feature") + logger.error("Unable to get_user, license does not support LDAP authentication") return None return super(LDAPBackend, self).get_user(user_id) @@ -88,7 +88,7 @@ class RADIUSBackend(BaseRADIUSBackend): if not django_settings.RADIUS_SERVER: return None if not feature_enabled('enterprise_auth'): - logger.error("RADIUS authenticate failed for missing license feature") + logger.error("Unable to authenticate, license does not support RADIUS authentication") return None return super(RADIUSBackend, self).authenticate(username, password) @@ -96,7 +96,7 @@ class RADIUSBackend(BaseRADIUSBackend): if not django_settings.RADIUS_SERVER: return None if not feature_enabled('enterprise_auth'): - logger.error("RADIUS get_user failed for missing license feature") + logger.error("Unable to get_user, license does not support RADIUS authentication") return None return super(RADIUSBackend, self).get_user(user_id) @@ -113,7 +113,7 @@ class SAMLAuth(BaseSAMLAuth): django_settings.SOCIAL_AUTH_SAML_ENABLED_IDPS]): return None if not feature_enabled('enterprise_auth'): - logger.error("SAML authenticate failed for missing license feature") + logger.error("Unable to authenticate, license does not support SAML authentication") return None return super(SAMLAuth, self).authenticate(username, password) @@ -124,7 +124,7 @@ class SAMLAuth(BaseSAMLAuth): django_settings.SOCIAL_AUTH_SAML_ENABLED_IDPS]): return None if not feature_enabled('enterprise_auth'): - logger.error("SAML get_user failed for missing license feature") + logger.error("Unable to get_user, license does not support SAML authentication") return None return super(SAMLAuth, self).get_user(user_id)