@@ -701,15 +701,7 @@ func (h *Handler) getOidcUserInfo(w http.ResponseWriter, r *http.Request) {
701
701
interim ["jti" ] = uuid .New ()
702
702
interim ["iat" ] = time .Now ().Unix ()
703
703
704
- keyID , err := h .r .OpenIDJWTStrategy ().GetPublicKeyID (ctx )
705
- if err != nil {
706
- h .r .Writer ().WriteError (w , r , err )
707
- return
708
- }
709
-
710
- token , _ , err := h .r .OpenIDJWTStrategy ().Generate (ctx , interim , & jwt.Headers {
711
- Extra : map [string ]interface {}{"kid" : keyID },
712
- })
704
+ token , _ , err := h .r .OpenIDJWTStrategy ().Generate (ctx , interim , & jwt.Headers {})
713
705
if err != nil {
714
706
h .r .Writer ().WriteError (w , r , err )
715
707
return
@@ -1185,17 +1177,6 @@ func (h *Handler) oauth2TokenExchange(w http.ResponseWriter, r *http.Request) {
1185
1177
if accessRequest .GetGrantTypes ().ExactOne (string (fosite .GrantTypeClientCredentials )) ||
1186
1178
accessRequest .GetGrantTypes ().ExactOne (string (fosite .GrantTypeJWTBearer )) ||
1187
1179
accessRequest .GetGrantTypes ().ExactOne (string (fosite .GrantTypePassword )) {
1188
- var accessTokenKeyID string
1189
- if h .c .AccessTokenStrategy (ctx , client .AccessTokenStrategySource (accessRequest .GetClient ())) == "jwt" {
1190
- accessTokenKeyID , err = h .r .AccessTokenJWTStrategy ().GetPublicKeyID (ctx )
1191
- if err != nil {
1192
- h .logOrAudit (err , r )
1193
- h .r .OAuth2Provider ().WriteAccessError (ctx , w , accessRequest , err )
1194
- events .Trace (ctx , events .TokenExchangeError , events .WithRequest (accessRequest ), events .WithError (err ))
1195
- return
1196
- }
1197
- }
1198
-
1199
1180
// only for client_credentials, otherwise Authentication is included in session
1200
1181
if accessRequest .GetGrantTypes ().ExactOne (string (fosite .GrantTypeClientCredentials )) {
1201
1182
session .Subject = accessRequest .GetClient ().GetID ()
@@ -1213,7 +1194,6 @@ func (h *Handler) oauth2TokenExchange(w http.ResponseWriter, r *http.Request) {
1213
1194
}
1214
1195
}
1215
1196
session .ClientID = accessRequest .GetClient ().GetID ()
1216
- session .KID = accessTokenKeyID
1217
1197
session .DefaultSession .Claims .Issuer = h .c .IssuerURL (ctx ).String ()
1218
1198
session .DefaultSession .Claims .IssuedAt = time .Now ().UTC ()
1219
1199
@@ -1404,21 +1384,6 @@ func (h *Handler) updateSessionWithRequest(
1404
1384
request .GrantAudience (audience )
1405
1385
}
1406
1386
1407
- openIDKeyID , err := h .r .OpenIDJWTStrategy ().GetPublicKeyID (ctx )
1408
- if err != nil {
1409
- x .LogError (r , err , h .r .Logger ())
1410
- return nil , err
1411
- }
1412
-
1413
- var accessTokenKeyID string
1414
- if h .c .AccessTokenStrategy (ctx , client .AccessTokenStrategySource (request .GetClient ())) == "jwt" {
1415
- accessTokenKeyID , err = h .r .AccessTokenJWTStrategy ().GetPublicKeyID (ctx )
1416
- if err != nil {
1417
- x .LogError (r , err , h .r .Logger ())
1418
- return nil , err
1419
- }
1420
- }
1421
-
1422
1387
obfuscatedSubject , err := h .r .ConsentStrategy ().ObfuscateSubjectIdentifier (ctx , request .GetClient (), consent .ConsentRequest .Subject , consent .ConsentRequest .ForceSubjectIdentifier )
1423
1388
if e := & (fosite.RFC6749Error {}); errors .As (err , & e ) {
1424
1389
x .LogAudit (r , err , h .r .AuditLogger ())
@@ -1456,13 +1421,9 @@ func (h *Handler) updateSessionWithRequest(
1456
1421
session .DefaultSession = & openid.DefaultSession {}
1457
1422
}
1458
1423
session .DefaultSession .Claims = claims
1459
- session .DefaultSession .Headers = & jwt.Headers {Extra : map [string ]interface {}{
1460
- // required for lookup on jwk endpoint
1461
- "kid" : openIDKeyID ,
1462
- }}
1424
+ session .DefaultSession .Headers = jwt .NewHeaders ()
1463
1425
session .DefaultSession .Subject = consent .ConsentRequest .Subject
1464
1426
session .Extra = consent .Session .AccessToken
1465
- session .KID = accessTokenKeyID
1466
1427
session .ClientID = request .GetClient ().GetID ()
1467
1428
session .ConsentChallenge = consent .ConsentRequestID
1468
1429
session .ExcludeNotBeforeClaim = h .c .ExcludeNotBeforeClaim (ctx )
@@ -1623,13 +1584,7 @@ func (h *Handler) createVerifiableCredential(w http.ResponseWriter, r *http.Requ
1623
1584
}
1624
1585
}
1625
1586
1626
- signingKeyID , err := h .r .OpenIDJWTStrategy ().GetPublicKeyID (ctx )
1627
- if err != nil {
1628
- h .r .Writer ().WriteError (w , r , errorsx .WithStack (err ))
1629
- return
1630
- }
1631
1587
headers := jwt .NewHeaders ()
1632
- headers .Add ("kid" , signingKeyID )
1633
1588
mapClaims , err := vcClaims .ToMapClaims ()
1634
1589
if err != nil {
1635
1590
h .r .Writer ().WriteError (w , r , errorsx .WithStack (err ))
0 commit comments