chore: remove debug logging from OidcTokenExchanger
All checks were successful
CI / cleanup-branch (push) Has been skipped
CI / build (push) Successful in 1m16s
CI / docker (push) Successful in 1m2s
CI / deploy-feature (push) Has been skipped
CI / deploy (push) Successful in 37s

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
hsiegeln
2026-04-07 10:50:27 +02:00
parent f601074e78
commit 7d5866bca8

View File

@@ -124,25 +124,18 @@ public class OidcTokenExchanger {
// Try roles from access_token first (JWT providers like Logto, Keycloak),
// then fall back to id_token
List<String> roles = Collections.emptyList();
log.info("OIDC access_token: isJwt={}, length={}, prefix='{}'",
accessTokenStr != null && accessTokenStr.contains("."),
accessTokenStr != null ? accessTokenStr.length() : 0,
accessTokenStr != null ? accessTokenStr.substring(0, Math.min(30, accessTokenStr.length())) : "null");
if (accessTokenStr != null && accessTokenStr.contains(".")) {
try {
String audience = config.audience() != null ? config.audience() : "";
JWTClaimsSet atClaims = decodeAccessToken(accessTokenStr, config.issuerUri(), audience);
if (atClaims != null) {
log.info("OIDC access_token claims: {}", atClaims.getClaims().keySet());
roles = extractRoles(atClaims, config.rolesClaim());
if (!roles.isEmpty()) {
log.info("OIDC roles from access_token: {}", roles);
}
} else {
log.info("OIDC access_token audience mismatch (expected='{}')", audience);
}
} catch (Exception e) {
log.warn("Could not decode access_token as JWT: {}", e.getMessage());
log.debug("Could not decode access_token as JWT: {}", e.getMessage());
}
}
if (roles.isEmpty()) {