Open ChronoDK opened 1 week ago
https://github.com/jpadilla/pyjwt/pull/1005 most likely.
We also stumbled over having "sub": 1234
in our unit test token this morning. If this is illegal it should fail on jwt_encode already, which still happily produces these tokens.
Setting options={"verify_sub": False}
prevents the InvalidSubjectError, if that happens to help you.
I'm also facing this issue with my flask website with Flask-JWT-Extended.
The @jwt_required
endpoint returns
{
"msg": "Subject must be a string"
}
Downgraded to pip install PyJWT==2.9.0
for now.
PS: wrote very verbosely for others facing the same issues and searching around.
We just ran into this issue, thankfully our tests caught it before pushing to production. Pinning to 2.9.0
fixed it- I assume this is not a planned breaking change.
Hello, We had this breaking change as well, but adopted the 2.10 version nonetheless as it was simple to fix
We are affected by this change as well via Flask-JWT-Extended.
This change caused all our protected requests to fail with 401. We caught it on dev environment, luckily. Nonetheless, minor version bump should not introduce a breaking change.
is it normal that a csrf field now appears in the web token from 2.10.0 whereas it was not there before ?
Same issue here. Downgraded to 2.90
@ChronoDK The "sub" claim if present should indeed be a string according to the JWT RTF:
The "sub" value is a case-sensitive string containing a StringOrURI value. Use of this claim is OPTIONAL. SOURCE
So in that sense the validation logic is correct to throw an error. As for all other JWT claim validations, these validations are turned on by default (see #1005), so I can imagine it might have broken some code. In case no sub
claim is provided in the JWT payload, the validator should still pass though.
I'm not author that built this functionality, but I was suggesting the 2.10.0 version number in my PR, to get some of the new functionality available through an official release. So my apologies if the version number created the wrong expectations, and broke any code. To go back to the old behaviour of 2.9.0 and below, just add the following as @WolfgangFellger already suggested:
my_jwt = "JWTGoesHere"
jwt.decode(my_jwt, options={"verify_sub": False, "verify_jti": False})
Or start using the new validation functionality:
my_jwt = "JWTGoesHere"
my_expected_subject = "someSubject"
jwt.decode(my_jwt, subject=my_expected_subject)
Hi everyone,
I appreciate the feedback regarding the sub
claim validation introduced in version 2.10.0. My intention was to ensure compliance with the JWT specification, which states that the sub
claim should be a string.
I understand that this change may have caused issues for some users whose JWTs contain non-string sub
values or who were not expecting this validation to be enforced by default.
To address this you can follow the steps mentioned by @benvdh-incentro or @WolfgangFellger or refer to the solution provided here
Thank you for bringing this to my attention.
Hi. FWIW, having been tripped on Apache Superset, we have been able to followup on your reference to flask-jwt-extended. Thank you very much, @Divan009.
Coming from there, and after receiving support on https://github.com/apache/superset/issues/30995, the right solution for us was to update to flask-jwt-extended 4.7.1 released two days ago, and configure JWT_VERIFY_SUB = False
.
It seems there is a breaking change in 2.10.0 - sub must be a string now. Is this intentional? Not sure how to handle this change for now, except keep using 2.9.0.