dimas-b commented on code in PR #1001: URL: https://github.com/apache/polaris/pull/1001#discussion_r1960905977
########## service/common/src/main/java/org/apache/polaris/service/auth/JWTBroker.java: ########## @@ -86,10 +88,13 @@ public String getSub() { @Override public String getScope() { - return decodedJWT.getClaim("scope").asString(); + return decodedJWT.getClaim(CLAIM_KEY_SCOPE).asString(); } }; + } catch (TokenExpiredException e) { + LOGGER.error("Credentials have timed out with error", e); + throw new AuthenticationTimeoutException("Credentials have timed out"); Review Comment: 1) From a general security perspective, I believe is preferable to avoid disclosing unnecessary information. A response that specifically indicates the token has expired indicated that aside from the expiry date the token was valid. This can be used as a leverage in attacks. 2) There appears to be [prior usage](https://en.wikipedia.org/wiki/List_of_HTTP_status_codes) of the 419 repose code by `Laravel Framework` with a _different_ meaning related to "Cross-Site Request Forgery (CSRF)" tokens. 3) 419 is generally not used by any well-known IdPs, so it will be impossible for Polaris to produce consistent response code when external IdPs are supported. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: issues-unsubscr...@polaris.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org