Skip to content

Conversation

@appleboy
Copy link
Owner

@appleboy appleboy commented Jul 17, 2025

  • Upgrade github.com/golang-jwt/jwt dependency from v4 to v5
  • Update token expiration error handling to use new v5 error types
  • Add logging for tokens with invalid claims
  • Adjust test assertions to match updated error messages from jwt v5
  • Improve handling of JWT exp claim errors, distinguishing between expired, missing, and invalid type cases
  • Ensure ParseOptions always include WithTimeFunc for correct time validation
  • Fix typo in exp claim comment
  • Add a check for missing exp claim for backwards compatibility
  • Update tests to verify correct error messages and status codes for missing or invalid exp claims
  • Add new tests for required exp claim and invalid exp format scenarios

fixed: #332

Co-Author: @gblandinkingland

Summary by CodeRabbit

Summary by CodeRabbit

  • Bug Fixes

    • Improved error handling for expired and invalid JWT tokens, providing clearer feedback during authentication.
  • Tests

    • Updated tests to align with new JWT library version and revised error messages for token validation.
    • Added tests for stricter validation of token expiration claims.
  • Chores

    • Upgraded JWT library dependency to the latest major version for enhanced security and compatibility.

- Upgrade github.com/golang-jwt/jwt dependency from v4 to v5
- Update token expiration error handling to use new v5 error types
- Add logging for tokens with invalid claims
- Adjust test assertions to match updated error messages from jwt v5

Signed-off-by: Bo-Yi Wu <[email protected]>
@coderabbitai
Copy link
Contributor

coderabbitai bot commented Jul 17, 2025

Warning

Rate limit exceeded

@appleboy has exceeded the limit for the number of commits or files that can be reviewed per hour. Please wait 15 minutes and 52 seconds before requesting another review.

⌛ How to resolve this issue?

After the wait time has elapsed, a review can be triggered using the @coderabbitai review command as a PR comment. Alternatively, push new commits to this PR.

We recommend that you space out your commits to avoid hitting the rate limit.

🚦 How do rate limits work?

CodeRabbit enforces hourly rate limits for each developer per organization.

Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout.

Please see our FAQ for further information.

📥 Commits

Reviewing files that changed from the base of the PR and between df31734 and 317bbef.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (2)
  • auth_jwt_test.go (3 hunks)
  • go.mod (1 hunks)

Walkthrough

The changes update the JWT library dependency from version v4 to v5, revise error handling logic for token expiration and claim validation in the authentication code, and adjust related tests to reflect stricter and more precise error reporting for the "exp" claim. No public API or exported function signatures were altered.

Changes

File(s) Change Summary
auth_jwt.go Updated JWT import to v5, initialized ParseOptions if empty, appended jwt.WithTimeFunc, and refactored error handling for "exp" claim and token expiration using new JWT v5 error conventions.
auth_jwt_test.go Switched to JWT v5, removed explicit "exp" claim in one test, updated error assertions for malformed or missing "exp" claims, and added a new test validating strict "exp" claim requirements with parser options.
go.mod Upgraded JWT library dependency from v4.5.2 to v5.2.0.

Poem

A hop, a skip, a version jump,
JWT’s now v5—no longer a grump!
Errors are clearer, claims checked anew,
Tests keep us honest, as rabbits do.
With tokens refreshed and code now tight,
We leap ahead—security in sight! 🐇✨

✨ Finishing Touches
  • 📝 Generate Docstrings

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary of Changes

Hello @appleboy, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request primarily focuses on migrating the project's JWT dependency to the latest major version (golang-jwt/jwt v5). This upgrade necessitated changes to how token expiration and invalid claims are handled, including updating error checks and introducing new logging for better diagnostics. The associated test suite has also been updated to reflect these changes and ensure continued functionality.

Highlights

  • Dependency Upgrade: I've upgraded the github.com/golang-jwt/jwt library from version 4 to version 5. This is a major version bump and introduces significant changes to the API, particularly around error handling.
  • Error Handling Refinement: I've updated the token expiration error handling logic to align with the new error types introduced in golang-jwt/jwt v5. This now uses errors.Is to check for jwt.ErrTokenExpired and jwt.ErrTokenInvalidClaims.
  • Improved Logging: I've added a new logging statement that will print a message when a token is found to have invalid claims, which should help in debugging authentication issues.
  • Test Suite Adjustments: I've modified existing test assertions to reflect the updated error messages and behaviors from the golang-jwt/jwt v5 library, ensuring the test suite remains accurate and passes with the new dependency.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point in your pull request via creating an issue comment (i.e. comment on the pull request page) using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in issue comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist is currently in preview and may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments to provide feedback.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 3bf5c41 and 9cbe44f.

⛔ Files ignored due to path filters (1)
  • go.sum is excluded by !**/*.sum
📒 Files selected for processing (3)
  • auth_jwt.go (2 hunks)
  • auth_jwt_test.go (2 hunks)
  • go.mod (1 hunks)
🔇 Additional comments (6)
auth_jwt_test.go (3)

17-17: Import upgrade looks good.

The JWT library import has been correctly updated to v5, aligning with the dependency upgrade.


589-593: Token creation change aligns with v5 behavior.

The removal of the explicit exp claim setting is appropriate. The token will rely on the JWT library's default expiration handling, which is consistent with how v5 processes expired tokens within the MaxRefresh window.


1245-1245: Error message assertion updated for JWT v5.

The test correctly updates the expected error message to match the new format returned by JWT v5 library when the exp claim has an invalid type. The case-insensitive comparison handles potential variations in error message formatting.

auth_jwt.go (3)

7-7: Log import added for enhanced error logging.

The log import supports the new logging functionality for invalid token claims, which improves debugging capabilities.


14-14: JWT library import upgraded correctly.

The import has been properly updated to v5, consistent with the dependency upgrade in go.mod.


649-656: Improved error handling with JWT v5 idioms.

The error handling has been correctly updated to use errors.Is comparisons against the new JWT v5 error constants:

  • jwt.ErrTokenExpired for expired tokens (allowing refresh within MaxRefresh window)
  • jwt.ErrTokenInvalidClaims for invalid claims with enhanced logging

This approach is more robust and idiomatic than the previous type assertion method, and maintains the same logical behavior while adding better logging for debugging invalid claims.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request migrates the golang-jwt dependency from v4 to v5 and updates the error handling for expired tokens. Identified two areas for improvement: configurable logger in auth_jwt.go and restoring the exp claim in a key test case in auth_jwt_test.go. Also, the error message in TestExpiredField has changed due to the library update, so ensure this new message is stable and won't change with future library updates.

claims := token.Claims.(jwt.MapClaims)
claims["identity"] = "admin"
claims["exp"] = time.Now().Add(-time.Minute).Unix()
claims["orig_iat"] = time.Now().Add(-time.Hour).Unix()

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

high

The exp claim was removed from this test, but this test is intended to verify that an expired token can be refreshed if it's within the MaxRefresh window. By removing the exp claim, the token is no longer expired, and the test no longer covers the intended scenario. Please restore the exp claim to ensure the new error handling logic in CheckIfTokenExpire is correctly tested for expired tokens.

Suggested change
claims["orig_iat"] = time.Now().Add(-time.Hour).Unix()
claims["exp"] = time.Now().Add(-time.Minute).Unix()

auth_jwt.go Outdated
Comment on lines 653 to 655
if errors.Is(err, jwt.ErrTokenInvalidClaims) {
log.Println("Token has invalid claims, exp is invalid")
return nil, err

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

Consider using a configurable logger instead of the standard log package, to allow users to control logging behavior. Also, suggest logging the error itself for better debugging, since jwt.ErrTokenInvalidClaims can be triggered by various invalid claims.

log.Printf("Token has invalid claims: %v", err)

auth_jwt_test.go Outdated
message := gjson.Get(r.Body.String(), "message")

assert.Equal(t, ErrExpiredToken.Error(), strings.ToLower(message.String()))
assert.Equal(t, "token has invalid claims: invalid type for claim: exp is invalid", strings.ToLower(message.String()))

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

The error message has changed due to the library update. It's good to update the assertion, but ensure this new message is stable and won't change with future library updates. If the message is not stable, consider asserting on a more general error condition or code.

appleboy added 4 commits July 17, 2025 10:08
- Improve handling of JWT exp claim errors, distinguishing between expired, missing, and invalid type cases
- Ensure ParseOptions always include WithTimeFunc for correct time validation
- Fix typo in exp claim comment
- Add a check for missing exp claim for backwards compatibility
- Update tests to verify correct error messages and status codes for missing or invalid exp claims
- Add new tests for required exp claim and invalid exp format scenarios

Signed-off-by: Bo-Yi Wu <[email protected]>
- Remove unused log import
- Eliminate redundant error handling for invalid JWT claims in CheckIfTokenExpire

Signed-off-by: Bo-Yi Wu <[email protected]>
- Set the "exp" claim to one minute in the past in TestExpiredTokenWithinMaxRefreshOnRefreshHandler to simulate an expired token.

Signed-off-by: Bo-Yi Wu <[email protected]>
- Bump github.com/golang-jwt/jwt/v5 dependency version from 5.2.0 to 5.2.3

Signed-off-by: Bo-Yi Wu <[email protected]>
@appleboy appleboy merged commit 4fceb9a into master Jul 17, 2025
6 checks passed
@appleboy appleboy deleted the jwt branch October 11, 2025 07:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants