From 2541c78dd02a89f6670e22801dbd073e5fdfb1f0 Mon Sep 17 00:00:00 2001 From: Maycon Santos <mlsmaycon@gmail.com> Date: Sat, 22 Jul 2023 17:56:27 +0200 Subject: [PATCH] Use error level for JWT parsing error logs (#1026) --- management/server/http/middleware/auth_middleware.go | 2 +- management/server/jwtclaims/jwtValidator.go | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/management/server/http/middleware/auth_middleware.go b/management/server/http/middleware/auth_middleware.go index a8c81012a..898ad0875 100644 --- a/management/server/http/middleware/auth_middleware.go +++ b/management/server/http/middleware/auth_middleware.go @@ -57,7 +57,7 @@ func (m *AuthMiddleware) Handler(h http.Handler) http.Handler { case "bearer": err := m.CheckJWTFromRequest(w, r) if err != nil { - log.Debugf("Error when validating JWT claims: %s", err.Error()) + log.Errorf("Error when validating JWT claims: %s", err.Error()) util.WriteError(status.Errorf(status.Unauthorized, "token invalid"), w) return } diff --git a/management/server/jwtclaims/jwtValidator.go b/management/server/jwtclaims/jwtValidator.go index b206eb794..d15327566 100644 --- a/management/server/jwtclaims/jwtValidator.go +++ b/management/server/jwtclaims/jwtValidator.go @@ -155,7 +155,7 @@ func (m *JWTValidator) ValidateAndParse(token string) (*jwt.Token, error) { // Check if there was an error in parsing... if err != nil { - log.Debugf("error parsing token: %v", err) + log.Errorf("error parsing token: %v", err) return nil, fmt.Errorf("Error parsing token: %w", err) }