Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possibly misleading log in DefaultReactiveOpenIdTokenResponseValidator #1743

Open
mancze opened this issue Jun 25, 2024 · 0 comments
Open

Possibly misleading log in DefaultReactiveOpenIdTokenResponseValidator #1743

mancze opened this issue Jun 25, 2024 · 0 comments

Comments

@mancze
Copy link
Contributor

mancze commented Jun 25, 2024

Expected Behavior

DefaultReactiveOpenIdTokenResponseValidator should not make assumptions about implementation of the injected ReactiveJsonWebTokenValidator.

Actual Behaviour

DefaultReactiveOpenIdTokenResponseValidator assumes specifc implementation of the injected ReactiveJsonWebTokenValidator on the following line with logging:

LOG.trace("Validating the JWT signature using the JWKS uri [{}]", openIdProviderMetadata.getJwksUri());

This log could be misleading: injected implementation of the validator doesn't have to use JWKS uri from the openid metadata at all or it might be configured via configuration (https://micronaut-projects.github.io/micronaut-security/4.9.0/guide/index.html#jwks)

Steps To Reproduce

No response

Environment Information

No response

Example Application

No response

Version

4.5.0 (micronaut-security: 4.9.0)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant