Skip to content

Commit 49adaa1

Browse files
authored
Revert "Fix auth validation (#250)" (#253)
This reverts commit 27243e4.
1 parent 27243e4 commit 49adaa1

File tree

2 files changed

+11
-18
lines changed

2 files changed

+11
-18
lines changed

services/identity/src/main/java/com/crapi/config/JwtAuthTokenFilter.java

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -76,9 +76,6 @@ protected void doFilterInternal(
7676
response.sendError(
7777
HttpServletResponse.SC_UNAUTHORIZED, UserMessage.ACCOUNT_LOCKED_MESSAGE);
7878
}
79-
} else {
80-
tokenLogger.error(UserMessage.INVALID_CREDENTIALS);
81-
response.sendError(HttpServletResponse.SC_UNAUTHORIZED, UserMessage.INVALID_CREDENTIALS);
8279
}
8380
} catch (Exception e) {
8481
tokenLogger.error("Can NOT set user authentication -> Message:%d", e);
@@ -125,13 +122,10 @@ public String getUserFromToken(HttpServletRequest request) throws ParseException
125122
String username = null;
126123
if (token != null) {
127124
if (apiType == ApiType.APIKEY) {
128-
logger.debug("Token is api token");
129125
username = tokenProvider.getUserNameFromApiToken(token);
130126
} else {
131-
logger.debug("Token is jwt token");
132-
if (tokenProvider.validateJwtToken(token)) {
133-
username = tokenProvider.getUserNameFromJwtToken(token);
134-
}
127+
tokenProvider.validateJwtToken(token);
128+
username = tokenProvider.getUserNameFromJwtToken(token);
135129
}
136130
// checking username from token
137131
if (username != null) return username;

services/identity/src/main/java/com/crapi/config/JwtProvider.java

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -175,26 +175,25 @@ public boolean validateJwtToken(String authToken) {
175175
SignedJWT signedJWT = SignedJWT.parse(authToken);
176176
JWSHeader header = signedJWT.getHeader();
177177
Algorithm alg = header.getAlgorithm();
178-
boolean valid = false;
178+
179179
// JWT Algorithm confusion vulnerability
180-
logger.debug("Algorithm: " + alg.getName());
181-
JWSVerifier verifier;
180+
logger.info("Algorithm: " + alg.getName());
182181
if (Objects.equals(alg.getName(), "HS256")) {
183182
String secret = getJwtSecret(header);
184-
logger.debug("JWT Secret: " + secret);
185-
verifier = new MACVerifier(secret.getBytes(StandardCharsets.UTF_8));
183+
logger.info("JWT Secret: " + secret);
184+
JWSVerifier verifier = new MACVerifier(secret.getBytes(StandardCharsets.UTF_8));
185+
return signedJWT.verify(verifier);
186186
} else {
187187
RSAKey verificationKey = getKeyFromJkuHeader(header);
188+
JWSVerifier verifier;
188189
if (verificationKey == null) {
189-
logger.debug("Key from JWKS: " + this.publicRSAKey.toJSONString());
190190
verifier = new RSASSAVerifier(this.publicRSAKey);
191191
} else {
192-
logger.debug("Key from JKU: " + verificationKey.toJSONString());
192+
logger.info("Key from JKU: " + verificationKey.toJSONString());
193193
verifier = new RSASSAVerifier(verificationKey);
194194
}
195-
valid = signedJWT.verify(verifier);
196-
logger.info("JWT valid?: " + valid);
197-
return valid;
195+
196+
return signedJWT.verify(verifier);
198197
}
199198

200199
} catch (ParseException e) {

0 commit comments

Comments
 (0)