mirror of
https://github.com/zitadel/zitadel.git
synced 2025-01-05 14:37:45 +00:00
fix: internal check of JWT access tokens (#8486)
# Which Problems Are Solved When using a JWT access_token on a ZITADEL API, the token was considered invalid If the `WebKey` feature flag is enabled. # How the Problems Are Solved - Merge the new and old web keys if flag is enabled (as already done for the keys endpoint). # Additional Changes None # Additional Context relates to #8449
This commit is contained in:
parent
5faaf87b22
commit
862d141171
@ -4,6 +4,7 @@ import (
|
||||
"context"
|
||||
"encoding/base64"
|
||||
"fmt"
|
||||
"slices"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
@ -327,28 +328,39 @@ type openIDKeySet struct {
|
||||
|
||||
// VerifySignature implements the oidc.KeySet interface
|
||||
// providing an implementation for the keys retrieved directly from Queries
|
||||
func (o *openIDKeySet) VerifySignature(ctx context.Context, jws *jose.JSONWebSignature) ([]byte, error) {
|
||||
keySet, err := o.Queries.ActivePublicKeys(ctx, time.Now())
|
||||
func (o *openIDKeySet) VerifySignature(ctx context.Context, jws *jose.JSONWebSignature) (payload []byte, err error) {
|
||||
keySet := new(jose.JSONWebKeySet)
|
||||
if authz.GetFeatures(ctx).WebKey {
|
||||
keySet, err = o.Queries.GetWebKeySet(ctx)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
legacyKeySet, err := o.Queries.ActivePublicKeys(ctx, time.Now())
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error fetching keys: %w", err)
|
||||
}
|
||||
appendPublicKeysToWebKeySet(keySet, legacyKeySet)
|
||||
keyID, alg := oidc.GetKeyIDAndAlg(jws)
|
||||
key, err := oidc.FindMatchingKey(keyID, oidc.KeyUseSignature, alg, jsonWebKeys(keySet.Keys)...)
|
||||
key, err := oidc.FindMatchingKey(keyID, oidc.KeyUseSignature, alg, keySet.Keys...)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("invalid signature: %w", err)
|
||||
}
|
||||
return jws.Verify(&key)
|
||||
}
|
||||
|
||||
func jsonWebKeys(keys []query.PublicKey) []jose.JSONWebKey {
|
||||
webKeys := make([]jose.JSONWebKey, len(keys))
|
||||
for i, key := range keys {
|
||||
webKeys[i] = jose.JSONWebKey{
|
||||
func appendPublicKeysToWebKeySet(keyset *jose.JSONWebKeySet, pubkeys *query.PublicKeys) {
|
||||
if pubkeys == nil || len(pubkeys.Keys) == 0 {
|
||||
return
|
||||
}
|
||||
keyset.Keys = slices.Grow(keyset.Keys, len(pubkeys.Keys))
|
||||
|
||||
for _, key := range pubkeys.Keys {
|
||||
keyset.Keys = append(keyset.Keys, jose.JSONWebKey{
|
||||
Key: key.Key(),
|
||||
KeyID: key.ID(),
|
||||
Algorithm: key.Algorithm(),
|
||||
Use: key.Use().String(),
|
||||
Key: key.Key(),
|
||||
}
|
||||
})
|
||||
}
|
||||
return webKeys
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user