From 99d8f798c5f1ec0c6745867da0c416021b14dff8 Mon Sep 17 00:00:00 2001
From: 沈斌 <bluelazysb@hotmail.com>
Date: Sat, 09 Jun 2018 11:06:24 +0800
Subject: [PATCH] test

---
 src/main/java/com/moral/security/config/WebSecurityConfig.java      |    5 ++---
 src/main/java/com/moral/security/model/token/RawAccessJwtToken.java |    2 +-
 2 files changed, 3 insertions(+), 4 deletions(-)

diff --git a/src/main/java/com/moral/security/config/WebSecurityConfig.java b/src/main/java/com/moral/security/config/WebSecurityConfig.java
index c237db9..2182127 100644
--- a/src/main/java/com/moral/security/config/WebSecurityConfig.java
+++ b/src/main/java/com/moral/security/config/WebSecurityConfig.java
@@ -125,8 +125,7 @@
                 .antMatchers(API_ROOT_URL).authenticated() // Protected API End-points
             .and()
                 .addFilterBefore(new CustomCorsFilter(), UsernamePasswordAuthenticationFilter.class)
-                .addFilterBefore(buildLoginProcessingFilter(AUTHENTICATION_URL), UsernamePasswordAuthenticationFilter.class)
-                .addFilterBefore(buildJwtTokenAuthenticationProcessingFilter(permitAllEndpointList,
-                API_ROOT_URL), UsernamePasswordAuthenticationFilter.class);
+                .addFilterBefore(buildLoginProcessingFilter(AUTHENTICATION_URL), UsernamePasswordAuthenticationFilter.class);
+                //.addFilterBefore(buildJwtTokenAuthenticationProcessingFilter(permitAllEndpointList, API_ROOT_URL), UsernamePasswordAuthenticationFilter.class);
     }
 }
diff --git a/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java b/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java
index 9f923c2..b1d2bff 100644
--- a/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java
+++ b/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java
@@ -27,7 +27,7 @@
             return Jwts.parser().setSigningKey(signingKey).parseClaimsJws(this.token);
         } catch (UnsupportedJwtException | MalformedJwtException | IllegalArgumentException | SignatureException ex) {
             logger.error("Invalid JWT Token", ex);
-            //throw new BadCredentialsException("Invalid JWT token: ", ex);
+            throw new BadCredentialsException("Invalid JWT token: ", ex);
         } catch (ExpiredJwtException expiredEx) {
             logger.info("JWT Token is expired", expiredEx);
             throw new JwtExpiredTokenException(this, "JWT Token expired", expiredEx);

--
Gitblit v1.8.0