feat(oidc): client_secret_jwt authentication

This adds the authentication machinery for the client_secret_jwt Default Client Authentication Strategy.

Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
fix-pkce-flow
James Elliott 2023-04-15 20:55:38 +10:00
parent 7cf907b23d
commit a34b1412ed
No known key found for this signature in database
GPG Key ID: 0F1C4A096E857E49
1 changed files with 2 additions and 2 deletions

View File

@ -1884,11 +1884,11 @@ func TestValidateOIDCClients(t *testing.T) {
"ShouldRaiseErrorOnInvalidTokenAuthAlgClientTypeConfidential", "ShouldRaiseErrorOnInvalidTokenAuthAlgClientTypeConfidential",
func(have *schema.OpenIDConnectConfiguration) { func(have *schema.OpenIDConnectConfiguration) {
have.Clients[0].TokenEndpointAuthMethod = oidc.ClientAuthMethodClientSecretJWT have.Clients[0].TokenEndpointAuthMethod = oidc.ClientAuthMethodClientSecretJWT
have.Clients[0].TokenEndpointAuthSigningAlg = "abcinvalid" have.Clients[0].TokenEndpointAuthSigningAlg = "abc"
have.Clients[0].Secret = MustDecodeSecret("$plaintext$abc123") have.Clients[0].Secret = MustDecodeSecret("$plaintext$abc123")
}, },
func(t *testing.T, have *schema.OpenIDConnectConfiguration) { func(t *testing.T, have *schema.OpenIDConnectConfiguration) {
assert.Equal(t, "abcinvalid", have.Clients[0].TokenEndpointAuthSigningAlg) assert.Equal(t, "abc", have.Clients[0].TokenEndpointAuthSigningAlg)
}, },
tcv{ tcv{
nil, nil,