throw new OidcInvalidKeyException("Only RS256 keys are currently supported. Found key using {$alg}");
}
- if (empty($jwk['use'])) {
- throw new OidcInvalidKeyException('A "use" parameter on the provided key is expected');
- }
-
- if ($jwk['use'] !== 'sig') {
+ // 'use' is optional for a JWK but we assume 'sig' where no value exists since that's what
+ // the OIDC discovery spec infers since 'sig' MUST be set if encryption keys come into play.
+ $use = $jwk['use'] ?? 'sig';
+ if ($use !== 'sig') {
throw new OidcInvalidKeyException("Only signature keys are currently supported. Found key for use {$jwk['use']}");
}
*/
class OidcProviderSettings
{
- /**
- * @var string
- */
- public $issuer;
-
- /**
- * @var string
- */
- public $clientId;
-
- /**
- * @var string
- */
- public $clientSecret;
-
- /**
- * @var string
- */
- public $redirectUri;
-
- /**
- * @var string
- */
- public $authorizationEndpoint;
-
- /**
- * @var string
- */
- public $tokenEndpoint;
+ public string $issuer;
+ public string $clientId;
+ public string $clientSecret;
+ public ?string $redirectUri;
+ public ?string $authorizationEndpoint;
+ public ?string $tokenEndpoint;
/**
* @var string[]|array[]
*/
- public $keys = [];
+ public ?array $keys = [];
public function __construct(array $settings)
{
protected function filterKeys(array $keys): array
{
return array_filter($keys, function (array $key) {
- $alg = $key['alg'] ?? null;
+ $alg = $key['alg'] ?? 'RS256';
+ $use = $key['use'] ?? 'sig';
- return $key['kty'] === 'RSA' && $key['use'] === 'sig' && (is_null($alg) || $alg === 'RS256');
+ return $key['kty'] === 'RSA' && $use === 'sig' && $alg === 'RS256';
});
}
{
$settings = $this->getProviderSettings();
$provider = $this->getProvider($settings);
-
return [
'url' => $provider->getAuthorizationUrl(),
'state' => $provider->getState(),
$this->assertTrue(auth()->check());
}
+ public function test_auth_login_with_autodiscovery_with_keys_that_do_not_have_use_property()
+ {
+ // Based on reading the OIDC discovery spec:
+ // > This contains the signing key(s) the RP uses to validate signatures from the OP. The JWK Set MAY also
+ // > contain the Server's encryption key(s), which are used by RPs to encrypt requests to the Server. When
+ // > both signing and encryption keys are made available, a use (Key Use) parameter value is REQUIRED for all
+ // > keys in the referenced JWK Set to indicate each key's intended usage.
+ // We can assume that keys without use are intended for signing.
+ $this->withAutodiscovery();
+
+ $keyArray = OidcJwtHelper::publicJwkKeyArray();
+ unset($keyArray['use']);
+
+ $this->mockHttpClient([
+ $this->getAutoDiscoveryResponse(),
+ new Response(200, [
+ 'Content-Type' => 'application/json',
+ 'Cache-Control' => 'no-cache, no-store',
+ 'Pragma' => 'no-cache',
+ ], json_encode([
+ 'keys' => [
+ $keyArray,
+ ],
+ ])),
+ ]);
+
+ $this->assertFalse(auth()->check());
+ $this->runLogin();
+ $this->assertTrue(auth()->check());
+ }
+
public function test_login_group_sync()
{
config()->set([