From 99d8f798c5f1ec0c6745867da0c416021b14dff8 Mon Sep 17 00:00:00 2001
From: 沈斌 <bluelazysb@hotmail.com>
Date: Sat, 09 Jun 2018 11:06:24 +0800
Subject: [PATCH] test
---
src/main/java/com/moral/security/config/WebSecurityConfig.java | 5 ++---
src/main/java/com/moral/security/model/token/RawAccessJwtToken.java | 2 +-
2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/src/main/java/com/moral/security/config/WebSecurityConfig.java b/src/main/java/com/moral/security/config/WebSecurityConfig.java
index c237db9..2182127 100644
--- a/src/main/java/com/moral/security/config/WebSecurityConfig.java
+++ b/src/main/java/com/moral/security/config/WebSecurityConfig.java
@@ -125,8 +125,7 @@
.antMatchers(API_ROOT_URL).authenticated() // Protected API End-points
.and()
.addFilterBefore(new CustomCorsFilter(), UsernamePasswordAuthenticationFilter.class)
- .addFilterBefore(buildLoginProcessingFilter(AUTHENTICATION_URL), UsernamePasswordAuthenticationFilter.class)
- .addFilterBefore(buildJwtTokenAuthenticationProcessingFilter(permitAllEndpointList,
- API_ROOT_URL), UsernamePasswordAuthenticationFilter.class);
+ .addFilterBefore(buildLoginProcessingFilter(AUTHENTICATION_URL), UsernamePasswordAuthenticationFilter.class);
+ //.addFilterBefore(buildJwtTokenAuthenticationProcessingFilter(permitAllEndpointList, API_ROOT_URL), UsernamePasswordAuthenticationFilter.class);
}
}
diff --git a/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java b/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java
index 9f923c2..b1d2bff 100644
--- a/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java
+++ b/src/main/java/com/moral/security/model/token/RawAccessJwtToken.java
@@ -27,7 +27,7 @@
return Jwts.parser().setSigningKey(signingKey).parseClaimsJws(this.token);
} catch (UnsupportedJwtException | MalformedJwtException | IllegalArgumentException | SignatureException ex) {
logger.error("Invalid JWT Token", ex);
- //throw new BadCredentialsException("Invalid JWT token: ", ex);
+ throw new BadCredentialsException("Invalid JWT token: ", ex);
} catch (ExpiredJwtException expiredEx) {
logger.info("JWT Token is expired", expiredEx);
throw new JwtExpiredTokenException(this, "JWT Token expired", expiredEx);
--
Gitblit v1.8.0