Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix OIDC key resolver to accept SHA256 certificate thumbprints #36857

Merged
merged 1 commit into from
Nov 3, 2023

Conversation

sberyozkin
Copy link
Member

Fixes #36855.

Simple PR complementing the current support for the SHA-1 x5t thumbprint (which was added based on the user request earlier), now both xt5 and x5t#S256 thumbprints are precalculated.

Support for x5t#S256 was added to the token generation API earlier (as the test shows) but unfortunately it was not synced to the OIDC server side code.

Copy link

quarkus-bot bot commented Nov 3, 2023

✔️ The latest workflow run for the pull request has completed successfully.

It should be safe to merge provided you have a look at the other checks in the summary.

@sberyozkin
Copy link
Member Author

Thanks

@sberyozkin sberyozkin merged commit e1bfbf8 into quarkusio:main Nov 3, 2023
21 checks passed
@sberyozkin sberyozkin deleted the oidc_x5tS256 branch November 3, 2023 17:06
@quarkus-bot quarkus-bot bot added this to the 3.6 - main milestone Nov 3, 2023
@gsmet gsmet modified the milestones: 3.6 - main, 3.5.1 Nov 6, 2023
@aloubyansky
Copy link
Member

@sberyozkin backporting this PR to 3.2 will require some conflict resolution since it's applied on top of #35529

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

OIDC key resolver fails to recognize an x5t#S256 thumbprint
4 participants