fix: add ES384 to OidcTokenExchanger JWT algorithm list
Logto signs id_tokens with ES384 by default. SecurityConfig already included it but OidcTokenExchanger only had RS256 and ES256. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -231,7 +231,7 @@ public class OidcTokenExchanger {
|
||||
jwkSource = JWKSourceBuilder.create(jwksUrl).build();
|
||||
}
|
||||
|
||||
Set<JWSAlgorithm> expectedAlgs = Set.of(JWSAlgorithm.RS256, JWSAlgorithm.ES256);
|
||||
Set<JWSAlgorithm> expectedAlgs = Set.of(JWSAlgorithm.ES384, JWSAlgorithm.ES256, JWSAlgorithm.RS256);
|
||||
JWSKeySelector<SecurityContext> keySelector =
|
||||
new JWSVerificationKeySelector<>(expectedAlgs, jwkSource);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user