@@ -152,7 +152,7 @@ static ngx_int_t ngx_http_auth_jwt_handler(ngx_http_request_t *r)
152
152
auth_jwt_algorithm = jwtcf -> auth_jwt_algorithm ;
153
153
if (auth_jwt_algorithm .len == 0 || (auth_jwt_algorithm .len == sizeof ("HS256" ) - 1 && ngx_strncmp (auth_jwt_algorithm .data , "HS256" , sizeof ("HS256" ) - 1 )== 0 ))
154
154
{
155
- ngx_log_error (NGX_LOG_DEBUG , r -> connection -> log , 0 , "got to 0" );
155
+ ngx_log_error (NGX_LOG_ERROR , r -> connection -> log , 0 , "got to 0" );
156
156
keylen = jwtcf -> auth_jwt_key .len / 2 ;
157
157
keyBinary = ngx_palloc (r -> pool , keylen );
158
158
if (0 != hex_to_binary ((char * )jwtcf -> auth_jwt_key .data , keyBinary , jwtcf -> auth_jwt_key .len ))
@@ -164,14 +164,14 @@ static ngx_int_t ngx_http_auth_jwt_handler(ngx_http_request_t *r)
164
164
else if ( auth_jwt_algorithm .len == sizeof ("RS256" ) - 1 && ngx_strncmp (auth_jwt_algorithm .data , "RS256" , sizeof ("RS256" ) - 1 ) == 0 )
165
165
{
166
166
// in this case, 'Binary' is a misnomer, as it is the private key string itself
167
- ngx_log_error (NGX_LOG_DEBUG , r -> connection -> log , 0 , "got to 1" );
167
+ ngx_log_error (NGX_LOG_ERROR , r -> connection -> log , 0 , "got to 1" );
168
168
keyBinary = ngx_palloc (r -> pool , jwtcf -> auth_jwt_key .len );
169
169
ngx_memcpy (keyBinary , jwtcf -> auth_jwt_key .data , jwtcf -> auth_jwt_key .len );
170
170
keylen = jwtcf -> auth_jwt_key .len ;
171
171
}
172
172
173
173
// validate the jwt
174
- ngx_log_error (NGX_LOG_DEBUG , r -> connection -> log , 0 , "trying to decode JWT" );
174
+ ngx_log_error (NGX_LOG_ERROR , r -> connection -> log , 0 , "trying to decode JWT" );
175
175
jwtParseReturnCode = jwt_decode (& jwt , jwtCookieValChrPtr , keyBinary , keylen );
176
176
177
177
if (jwtParseReturnCode != 0 )
0 commit comments