diff --git a/auth/middleware/middleware.go b/auth/middleware/middleware.go index 8fd225c..3d5acee 100644 --- a/auth/middleware/middleware.go +++ b/auth/middleware/middleware.go @@ -200,7 +200,7 @@ func (auth *AuthClient) Authorize(sub, resource, action string) fiber.Handler { span.End() - return c.Status(http.StatusInternalServerError).SendString("Internal Server Error") + return c.Status(statusCode).SendString(http.StatusText(statusCode)) } else if authorized { span.End() @@ -232,7 +232,7 @@ func (auth *AuthClient) checkAuthorization(ctx context.Context, sub, resource, a opentelemetry.HandleSpanError(span, "Failed to parse token", err) - return false, http.StatusInternalServerError, err + return false, http.StatusUnauthorized, err } claims, ok := token.Claims.(jwt.MapClaims) @@ -243,7 +243,7 @@ func (auth *AuthClient) checkAuthorization(ctx context.Context, sub, resource, a opentelemetry.HandleSpanError(span, "Failed to parse claims", err) - return false, http.StatusInternalServerError, err + return false, http.StatusUnauthorized, err } userType, _ := claims["type"].(string) diff --git a/auth/middleware/middleware_test.go b/auth/middleware/middleware_test.go index d0a72f7..3600cc7 100644 --- a/auth/middleware/middleware_test.go +++ b/auth/middleware/middleware_test.go @@ -305,7 +305,7 @@ func TestCheckAuthorization_InvalidToken(t *testing.T) { require.Error(t, err) assert.False(t, authorized) - assert.Equal(t, http.StatusInternalServerError, statusCode) + assert.Equal(t, http.StatusUnauthorized, statusCode) } func TestCheckAuthorization_EmptyTypeClaim_TreatedAsNonNormalUser(t *testing.T) {