@@ -29,34 +29,34 @@ async def dispatch(self, request: Request, call_next):
2929 # Extract Authorization header
3030 auth_header = request .headers .get ("authorization" )
3131 if not auth_header :
32- raise AuthenticationRequired ("Missing Authorization header" )
32+ raise MalformedAuthorizationRequest ("Missing Authorization header" )
3333 if not auth_header .lower ().startswith ("bearer " ):
3434 raise MalformedAuthorizationRequest ("Invalid Authorization header format" )
3535
3636 # Extract and verify token
37- token = auth_header [7 :] # Remove "Bearer " prefix
37+ token = auth_header [7 :]. strip () # Remove "Bearer " prefix
3838 try :
3939 decoded_and_verified_token = await self .client .verify_access_token (
4040 token ,
4141 required_claims = ["sub" ]
4242 )
4343
4444 # Check for client_id or azp
45- clientId = decoded_and_verified_token .get ('client_id' ) or decoded_and_verified_token .get ('azp' )
46- if not clientId :
45+ client_id = decoded_and_verified_token .get ('client_id' ) or decoded_and_verified_token .get ('azp' )
46+ if not client_id :
4747 raise VerifyAccessTokenError ("Token is missing 'client_id' or 'azp' claim" )
4848
4949 # Set up authentication context
5050 auth_data = {
51- "client_id" : clientId ,
51+ "client_id" : client_id ,
5252 "scopes" : decoded_and_verified_token .get ("scope" , "" ).split ()
5353 if decoded_and_verified_token .get ("scope" ) else []
5454 }
5555
5656 if decoded_and_verified_token .get ('exp' ):
57- auth_data ["expiresAt " ] = decoded_and_verified_token .get ('exp' )
57+ auth_data ["expires_at " ] = decoded_and_verified_token .get ('exp' )
5858
59- extra = {"sub" : decoded_and_verified_token .get ('sub' ), "client_id" : clientId }
59+ extra = {"sub" : decoded_and_verified_token .get ('sub' ), "client_id" : client_id }
6060
6161 for field in ['azp' , 'name' , 'email' ]:
6262 if decoded_and_verified_token .get (field ):
@@ -66,10 +66,9 @@ async def dispatch(self, request: Request, call_next):
6666 request .state .auth = auth_data
6767
6868 return await call_next (request )
69- except VerifyAccessTokenError as e :
70- logger .error ( f "Token verification failed: { str ( e ) } " )
69+ except VerifyAccessTokenError :
70+ logger .info ( "Token verification failed" )
7171 raise AuthenticationRequired ("Invalid token" )
72- except Exception as e :
73- logger .error (f"Unexpected error in middleware: { str (e )} " )
74- # Re-raise unexpected errors to be handled by generic exception handler
72+ except Exception :
73+ logger .exception ("Unexpected error in middleware" )
7574 raise
0 commit comments