fix: add ES384 to OidcTokenExchanger JWT algorithm list
Logto signs id_tokens with ES384 by default. SecurityConfig already included it but OidcTokenExchanger only had RS256 and ES256. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -231,7 +231,7 @@ public class OidcTokenExchanger {
|
|||||||
jwkSource = JWKSourceBuilder.create(jwksUrl).build();
|
jwkSource = JWKSourceBuilder.create(jwksUrl).build();
|
||||||
}
|
}
|
||||||
|
|
||||||
Set<JWSAlgorithm> expectedAlgs = Set.of(JWSAlgorithm.RS256, JWSAlgorithm.ES256);
|
Set<JWSAlgorithm> expectedAlgs = Set.of(JWSAlgorithm.ES384, JWSAlgorithm.ES256, JWSAlgorithm.RS256);
|
||||||
JWSKeySelector<SecurityContext> keySelector =
|
JWSKeySelector<SecurityContext> keySelector =
|
||||||
new JWSVerificationKeySelector<>(expectedAlgs, jwkSource);
|
new JWSVerificationKeySelector<>(expectedAlgs, jwkSource);
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user