mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-22 11:46:40 +00:00
[chore]: Bump github.com/coreos/go-oidc/v3 from 3.5.0 to 3.6.0 (#1840)
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
This commit is contained in:
parent
e50b228539
commit
f620ee8da9
2
go.mod
2
go.mod
|
@ -19,7 +19,7 @@ require (
|
||||||
github.com/KimMachineGun/automemlimit v0.2.6
|
github.com/KimMachineGun/automemlimit v0.2.6
|
||||||
github.com/abema/go-mp4 v0.10.1
|
github.com/abema/go-mp4 v0.10.1
|
||||||
github.com/buckket/go-blurhash v1.1.0
|
github.com/buckket/go-blurhash v1.1.0
|
||||||
github.com/coreos/go-oidc/v3 v3.5.0
|
github.com/coreos/go-oidc/v3 v3.6.0
|
||||||
github.com/disintegration/imaging v1.6.2
|
github.com/disintegration/imaging v1.6.2
|
||||||
github.com/gin-contrib/cors v1.4.0
|
github.com/gin-contrib/cors v1.4.0
|
||||||
github.com/gin-contrib/gzip v0.0.6
|
github.com/gin-contrib/gzip v0.0.6
|
||||||
|
|
12
go.sum
12
go.sum
|
@ -23,7 +23,6 @@ cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvf
|
||||||
cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg=
|
cloud.google.com/go/bigquery v1.5.0/go.mod h1:snEHRnqQbz117VIFhE8bmtwIDY80NLUZUMb4Nv6dBIg=
|
||||||
cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc=
|
cloud.google.com/go/bigquery v1.7.0/go.mod h1://okPTzCYNXSlb24MZs83e2Do+h+VXtc4gLoIoXIAPc=
|
||||||
cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ=
|
cloud.google.com/go/bigquery v1.8.0/go.mod h1:J5hqkt3O0uAFnINi6JXValWIb1v0goeZM77hZzJN/fQ=
|
||||||
cloud.google.com/go/compute/metadata v0.2.0/go.mod h1:zFmK7XCadkQkj6TtorcaGlCW1hT1fIilQDwofLpJ20k=
|
|
||||||
cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE=
|
cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7TKLgZqpHYE=
|
||||||
cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk=
|
cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk=
|
||||||
cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I=
|
cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I=
|
||||||
|
@ -132,8 +131,8 @@ github.com/cnf/structhash v0.0.0-20201127153200-e1b16c1ebc08 h1:ox2F0PSMlrAAiAdk
|
||||||
github.com/cockroachdb/apd v1.1.0/go.mod h1:8Sl8LxpKi29FqWXR16WEFZRNSz3SoPzUzeMeY4+DwBQ=
|
github.com/cockroachdb/apd v1.1.0/go.mod h1:8Sl8LxpKi29FqWXR16WEFZRNSz3SoPzUzeMeY4+DwBQ=
|
||||||
github.com/containerd/cgroups/v3 v3.0.1 h1:4hfGvu8rfGIwVIDd+nLzn/B9ZXx4BcCjzt5ToenJRaE=
|
github.com/containerd/cgroups/v3 v3.0.1 h1:4hfGvu8rfGIwVIDd+nLzn/B9ZXx4BcCjzt5ToenJRaE=
|
||||||
github.com/containerd/cgroups/v3 v3.0.1/go.mod h1:/vtwk1VXrtoa5AaZLkypuOJgA/6DyPMZHJPGQNtlHnw=
|
github.com/containerd/cgroups/v3 v3.0.1/go.mod h1:/vtwk1VXrtoa5AaZLkypuOJgA/6DyPMZHJPGQNtlHnw=
|
||||||
github.com/coreos/go-oidc/v3 v3.5.0 h1:VxKtbccHZxs8juq7RdJntSqtXFtde9YpNpGn0yqgEHw=
|
github.com/coreos/go-oidc/v3 v3.6.0 h1:AKVxfYw1Gmkn/w96z0DbT/B/xFnzTd3MkZvWLjF4n/o=
|
||||||
github.com/coreos/go-oidc/v3 v3.5.0/go.mod h1:ecXRtV4romGPeO6ieExAsUK9cb/3fp9hXNz1tlv8PIM=
|
github.com/coreos/go-oidc/v3 v3.6.0/go.mod h1:ZpHUsHBucTUj6WOkrP4E20UPynbLZzhTQ1XKCXkxyPc=
|
||||||
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
||||||
github.com/coreos/go-systemd v0.0.0-20190719114852-fd7a80b32e1f/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
github.com/coreos/go-systemd v0.0.0-20190719114852-fd7a80b32e1f/go.mod h1:F5haX7vjVVG0kc13fIWeqUViNPyEJxv/OmvnBo0Yme4=
|
||||||
github.com/coreos/go-systemd/v22 v22.3.2 h1:D9/bQk5vlXQFZ6Kwuu6zaiXJ9oTPe68++AzAJc1DzSI=
|
github.com/coreos/go-systemd/v22 v22.3.2 h1:D9/bQk5vlXQFZ6Kwuu6zaiXJ9oTPe68++AzAJc1DzSI=
|
||||||
|
@ -295,7 +294,6 @@ github.com/google/go-cmp v0.5.2/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/
|
||||||
github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
||||||
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
||||||
github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE=
|
||||||
github.com/google/go-cmp v0.5.8/go.mod h1:17dUlkBOakJ0+DkrSSNjCkIjxS6bF9zb3elmeNGIjoY=
|
|
||||||
github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38=
|
github.com/google/go-cmp v0.5.9 h1:O2Tfq5qg4qc4AmwVlvv0oLiVAGB7enBSJ2x2DqQFi38=
|
||||||
github.com/google/go-querystring v1.0.0 h1:Xkwi/a1rcvNg1PPYe5vI8GbeBY/jrVuDX5ASuANWTrk=
|
github.com/google/go-querystring v1.0.0 h1:Xkwi/a1rcvNg1PPYe5vI8GbeBY/jrVuDX5ASuANWTrk=
|
||||||
github.com/google/go-querystring v1.0.0/go.mod h1:odCYkC5MyYFN7vkCjXpyrEuKhc/BUO6wN/zVPAxq5ck=
|
github.com/google/go-querystring v1.0.0/go.mod h1:odCYkC5MyYFN7vkCjXpyrEuKhc/BUO6wN/zVPAxq5ck=
|
||||||
|
@ -771,8 +769,6 @@ golang.org/x/net v0.0.0-20201224014010-6772e930b67b/go.mod h1:m0MpNAwzfU5UDzcl9v
|
||||||
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
||||||
golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
|
golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
|
||||||
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
golang.org/x/net v0.0.0-20220722155237-a158d28d115b/go.mod h1:XRhObCWvk6IyKnWLug+ECip1KBveYUHfp+8e9klMJ9c=
|
||||||
golang.org/x/net v0.3.0/go.mod h1:MBQ8lrhLObU/6UmLb4fmbmk5OcyYmqtbGd/9yIeKjEE=
|
|
||||||
golang.org/x/net v0.4.0/go.mod h1:MBQ8lrhLObU/6UmLb4fmbmk5OcyYmqtbGd/9yIeKjEE=
|
|
||||||
golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
|
golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
|
||||||
golang.org/x/net v0.10.0 h1:X2//UzNDwYmtCLn7To6G58Wr6f5ahEAQgKNzv9Y951M=
|
golang.org/x/net v0.10.0 h1:X2//UzNDwYmtCLn7To6G58Wr6f5ahEAQgKNzv9Y951M=
|
||||||
golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
|
golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg=
|
||||||
|
@ -787,7 +783,6 @@ golang.org/x/oauth2 v0.0.0-20201208152858-08078c50e5b5/go.mod h1:KelEdhl1UZF7XfJ
|
||||||
golang.org/x/oauth2 v0.0.0-20210218202405-ba52d332ba99/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
golang.org/x/oauth2 v0.0.0-20210218202405-ba52d332ba99/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
||||||
golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
||||||
golang.org/x/oauth2 v0.0.0-20211104180415-d3ed0bb246c8/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
golang.org/x/oauth2 v0.0.0-20211104180415-d3ed0bb246c8/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
|
||||||
golang.org/x/oauth2 v0.3.0/go.mod h1:rQrIauxkUhJ6CuwEXwymO2/eh4xz2ZWF1nBkcxS+tGk=
|
|
||||||
golang.org/x/oauth2 v0.8.0 h1:6dkIjl3j3LtZ/O3sTgZTMsLKSftL/B8Zgq4huOIIUu8=
|
golang.org/x/oauth2 v0.8.0 h1:6dkIjl3j3LtZ/O3sTgZTMsLKSftL/B8Zgq4huOIIUu8=
|
||||||
golang.org/x/oauth2 v0.8.0/go.mod h1:yr7u4HXZRm1R1kBWqr/xKNqewf0plRYoB7sla+BCIXE=
|
golang.org/x/oauth2 v0.8.0/go.mod h1:yr7u4HXZRm1R1kBWqr/xKNqewf0plRYoB7sla+BCIXE=
|
||||||
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
|
||||||
|
@ -860,7 +855,6 @@ golang.org/x/sys v0.0.0-20220704084225-05e143d24a9e/go.mod h1:oPkhp1MJrh7nUepCBc
|
||||||
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.0.0-20220908164124-27713097b956/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20220908164124-27713097b956/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.3.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
|
||||||
golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/sys v0.8.0 h1:EBmGv8NaZBZTWvrbjNoL6HVt+IVy3QDQpJs7VRIw3tU=
|
golang.org/x/sys v0.8.0 h1:EBmGv8NaZBZTWvrbjNoL6HVt+IVy3QDQpJs7VRIw3tU=
|
||||||
|
@ -868,7 +862,6 @@ golang.org/x/sys v0.8.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw=
|
golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw=
|
||||||
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
||||||
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
||||||
golang.org/x/term v0.3.0/go.mod h1:q750SLmJuPmVoN1blW3UFBPREJfb1KmY3vwxfr+nFDA=
|
|
||||||
golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
|
golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
|
||||||
golang.org/x/term v0.8.0 h1:n5xxQn2i3PC0yLAbjTpNT85q/Kgzcr2gIoX9OrJUols=
|
golang.org/x/term v0.8.0 h1:n5xxQn2i3PC0yLAbjTpNT85q/Kgzcr2gIoX9OrJUols=
|
||||||
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
|
||||||
|
@ -880,7 +873,6 @@ golang.org/x/text v0.3.4/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
||||||
golang.org/x/text v0.5.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
|
||||||
golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
|
||||||
golang.org/x/text v0.9.0 h1:2sjJmO8cDvYveuX97RDLsxlyUxLl+GHoLxBiRdHllBE=
|
golang.org/x/text v0.9.0 h1:2sjJmO8cDvYveuX97RDLsxlyUxLl+GHoLxBiRdHllBE=
|
||||||
golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
|
golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
|
||||||
|
|
1
vendor/github.com/coreos/go-oidc/v3/oidc/jose.go
generated
vendored
1
vendor/github.com/coreos/go-oidc/v3/oidc/jose.go
generated
vendored
|
@ -13,4 +13,5 @@
|
||||||
PS256 = "PS256" // RSASSA-PSS using SHA256 and MGF1-SHA256
|
PS256 = "PS256" // RSASSA-PSS using SHA256 and MGF1-SHA256
|
||||||
PS384 = "PS384" // RSASSA-PSS using SHA384 and MGF1-SHA384
|
PS384 = "PS384" // RSASSA-PSS using SHA384 and MGF1-SHA384
|
||||||
PS512 = "PS512" // RSASSA-PSS using SHA512 and MGF1-SHA512
|
PS512 = "PS512" // RSASSA-PSS using SHA512 and MGF1-SHA512
|
||||||
|
EdDSA = "EdDSA" // Ed25519 using SHA-512
|
||||||
)
|
)
|
||||||
|
|
4
vendor/github.com/coreos/go-oidc/v3/oidc/jwks.go
generated
vendored
4
vendor/github.com/coreos/go-oidc/v3/oidc/jwks.go
generated
vendored
|
@ -4,6 +4,7 @@
|
||||||
"context"
|
"context"
|
||||||
"crypto"
|
"crypto"
|
||||||
"crypto/ecdsa"
|
"crypto/ecdsa"
|
||||||
|
"crypto/ed25519"
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
@ -32,6 +33,7 @@ func (s *StaticKeySet) VerifySignature(ctx context.Context, jwt string) ([]byte,
|
||||||
switch pub.(type) {
|
switch pub.(type) {
|
||||||
case *rsa.PublicKey:
|
case *rsa.PublicKey:
|
||||||
case *ecdsa.PublicKey:
|
case *ecdsa.PublicKey:
|
||||||
|
case ed25519.PublicKey:
|
||||||
default:
|
default:
|
||||||
return nil, fmt.Errorf("invalid public key type provided: %T", pub)
|
return nil, fmt.Errorf("invalid public key type provided: %T", pub)
|
||||||
}
|
}
|
||||||
|
@ -60,7 +62,7 @@ func newRemoteKeySet(ctx context.Context, jwksURL string, now func() time.Time)
|
||||||
if now == nil {
|
if now == nil {
|
||||||
now = time.Now
|
now = time.Now
|
||||||
}
|
}
|
||||||
return &RemoteKeySet{jwksURL: jwksURL, ctx: cloneContext(ctx), now: now}
|
return &RemoteKeySet{jwksURL: jwksURL, ctx: ctx, now: now}
|
||||||
}
|
}
|
||||||
|
|
||||||
// RemoteKeySet is a KeySet implementation that validates JSON web tokens against
|
// RemoteKeySet is a KeySet implementation that validates JSON web tokens against
|
||||||
|
|
133
vendor/github.com/coreos/go-oidc/v3/oidc/oidc.go
generated
vendored
133
vendor/github.com/coreos/go-oidc/v3/oidc/oidc.go
generated
vendored
|
@ -14,6 +14,7 @@
|
||||||
"mime"
|
"mime"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"golang.org/x/oauth2"
|
"golang.org/x/oauth2"
|
||||||
|
@ -48,39 +49,34 @@
|
||||||
// This method sets the same context key used by the golang.org/x/oauth2 package,
|
// This method sets the same context key used by the golang.org/x/oauth2 package,
|
||||||
// so the returned context works for that package too.
|
// so the returned context works for that package too.
|
||||||
//
|
//
|
||||||
// myClient := &http.Client{}
|
// myClient := &http.Client{}
|
||||||
// ctx := oidc.ClientContext(parentContext, myClient)
|
// ctx := oidc.ClientContext(parentContext, myClient)
|
||||||
//
|
|
||||||
// // This will use the custom client
|
|
||||||
// provider, err := oidc.NewProvider(ctx, "https://accounts.example.com")
|
|
||||||
//
|
//
|
||||||
|
// // This will use the custom client
|
||||||
|
// provider, err := oidc.NewProvider(ctx, "https://accounts.example.com")
|
||||||
func ClientContext(ctx context.Context, client *http.Client) context.Context {
|
func ClientContext(ctx context.Context, client *http.Client) context.Context {
|
||||||
return context.WithValue(ctx, oauth2.HTTPClient, client)
|
return context.WithValue(ctx, oauth2.HTTPClient, client)
|
||||||
}
|
}
|
||||||
|
|
||||||
// cloneContext copies a context's bag-of-values into a new context that isn't
|
func getClient(ctx context.Context) *http.Client {
|
||||||
// associated with its cancellation. This is used to initialize remote keys sets
|
|
||||||
// which run in the background and aren't associated with the initial context.
|
|
||||||
func cloneContext(ctx context.Context) context.Context {
|
|
||||||
cp := context.Background()
|
|
||||||
if c, ok := ctx.Value(oauth2.HTTPClient).(*http.Client); ok {
|
if c, ok := ctx.Value(oauth2.HTTPClient).(*http.Client); ok {
|
||||||
cp = ClientContext(cp, c)
|
return c
|
||||||
}
|
}
|
||||||
return cp
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// InsecureIssuerURLContext allows discovery to work when the issuer_url reported
|
// InsecureIssuerURLContext allows discovery to work when the issuer_url reported
|
||||||
// by upstream is mismatched with the discovery URL. This is meant for integration
|
// by upstream is mismatched with the discovery URL. This is meant for integration
|
||||||
// with off-spec providers such as Azure.
|
// with off-spec providers such as Azure.
|
||||||
//
|
//
|
||||||
// discoveryBaseURL := "https://login.microsoftonline.com/organizations/v2.0"
|
// discoveryBaseURL := "https://login.microsoftonline.com/organizations/v2.0"
|
||||||
// issuerURL := "https://login.microsoftonline.com/my-tenantid/v2.0"
|
// issuerURL := "https://login.microsoftonline.com/my-tenantid/v2.0"
|
||||||
//
|
//
|
||||||
// ctx := oidc.InsecureIssuerURLContext(parentContext, issuerURL)
|
// ctx := oidc.InsecureIssuerURLContext(parentContext, issuerURL)
|
||||||
//
|
//
|
||||||
// // Provider will be discovered with the discoveryBaseURL, but use issuerURL
|
// // Provider will be discovered with the discoveryBaseURL, but use issuerURL
|
||||||
// // for future issuer validation.
|
// // for future issuer validation.
|
||||||
// provider, err := oidc.NewProvider(ctx, discoveryBaseURL)
|
// provider, err := oidc.NewProvider(ctx, discoveryBaseURL)
|
||||||
//
|
//
|
||||||
// This is insecure because validating the correct issuer is critical for multi-tenant
|
// This is insecure because validating the correct issuer is critical for multi-tenant
|
||||||
// proivders. Any overrides here MUST be carefully reviewed.
|
// proivders. Any overrides here MUST be carefully reviewed.
|
||||||
|
@ -90,7 +86,7 @@ func InsecureIssuerURLContext(ctx context.Context, issuerURL string) context.Con
|
||||||
|
|
||||||
func doRequest(ctx context.Context, req *http.Request) (*http.Response, error) {
|
func doRequest(ctx context.Context, req *http.Request) (*http.Response, error) {
|
||||||
client := http.DefaultClient
|
client := http.DefaultClient
|
||||||
if c, ok := ctx.Value(oauth2.HTTPClient).(*http.Client); ok {
|
if c := getClient(ctx); c != nil {
|
||||||
client = c
|
client = c
|
||||||
}
|
}
|
||||||
return client.Do(req.WithContext(ctx))
|
return client.Do(req.WithContext(ctx))
|
||||||
|
@ -102,12 +98,33 @@ type Provider struct {
|
||||||
authURL string
|
authURL string
|
||||||
tokenURL string
|
tokenURL string
|
||||||
userInfoURL string
|
userInfoURL string
|
||||||
|
jwksURL string
|
||||||
algorithms []string
|
algorithms []string
|
||||||
|
|
||||||
// Raw claims returned by the server.
|
// Raw claims returned by the server.
|
||||||
rawClaims []byte
|
rawClaims []byte
|
||||||
|
|
||||||
remoteKeySet KeySet
|
// Guards all of the following fields.
|
||||||
|
mu sync.Mutex
|
||||||
|
// HTTP client specified from the initial NewProvider request. This is used
|
||||||
|
// when creating the common key set.
|
||||||
|
client *http.Client
|
||||||
|
// A key set that uses context.Background() and is shared between all code paths
|
||||||
|
// that don't have a convinent way of supplying a unique context.
|
||||||
|
commonRemoteKeySet KeySet
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *Provider) remoteKeySet() KeySet {
|
||||||
|
p.mu.Lock()
|
||||||
|
defer p.mu.Unlock()
|
||||||
|
if p.commonRemoteKeySet == nil {
|
||||||
|
ctx := context.Background()
|
||||||
|
if p.client != nil {
|
||||||
|
ctx = ClientContext(ctx, p.client)
|
||||||
|
}
|
||||||
|
p.commonRemoteKeySet = NewRemoteKeySet(ctx, p.jwksURL)
|
||||||
|
}
|
||||||
|
return p.commonRemoteKeySet
|
||||||
}
|
}
|
||||||
|
|
||||||
type providerJSON struct {
|
type providerJSON struct {
|
||||||
|
@ -132,6 +149,7 @@ type providerJSON struct {
|
||||||
PS256: true,
|
PS256: true,
|
||||||
PS384: true,
|
PS384: true,
|
||||||
PS512: true,
|
PS512: true,
|
||||||
|
EdDSA: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
// ProviderConfig allows creating providers when discovery isn't supported. It's
|
// ProviderConfig allows creating providers when discovery isn't supported. It's
|
||||||
|
@ -167,12 +185,13 @@ type ProviderConfig struct {
|
||||||
// through discovery.
|
// through discovery.
|
||||||
func (p *ProviderConfig) NewProvider(ctx context.Context) *Provider {
|
func (p *ProviderConfig) NewProvider(ctx context.Context) *Provider {
|
||||||
return &Provider{
|
return &Provider{
|
||||||
issuer: p.IssuerURL,
|
issuer: p.IssuerURL,
|
||||||
authURL: p.AuthURL,
|
authURL: p.AuthURL,
|
||||||
tokenURL: p.TokenURL,
|
tokenURL: p.TokenURL,
|
||||||
userInfoURL: p.UserInfoURL,
|
userInfoURL: p.UserInfoURL,
|
||||||
algorithms: p.Algorithms,
|
jwksURL: p.JWKSURL,
|
||||||
remoteKeySet: NewRemoteKeySet(cloneContext(ctx), p.JWKSURL),
|
algorithms: p.Algorithms,
|
||||||
|
client: getClient(ctx),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -221,26 +240,27 @@ func NewProvider(ctx context.Context, issuer string) (*Provider, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return &Provider{
|
return &Provider{
|
||||||
issuer: issuerURL,
|
issuer: issuerURL,
|
||||||
authURL: p.AuthURL,
|
authURL: p.AuthURL,
|
||||||
tokenURL: p.TokenURL,
|
tokenURL: p.TokenURL,
|
||||||
userInfoURL: p.UserInfoURL,
|
userInfoURL: p.UserInfoURL,
|
||||||
algorithms: algs,
|
jwksURL: p.JWKSURL,
|
||||||
rawClaims: body,
|
algorithms: algs,
|
||||||
remoteKeySet: NewRemoteKeySet(cloneContext(ctx), p.JWKSURL),
|
rawClaims: body,
|
||||||
|
client: getClient(ctx),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Claims unmarshals raw fields returned by the server during discovery.
|
// Claims unmarshals raw fields returned by the server during discovery.
|
||||||
//
|
//
|
||||||
// var claims struct {
|
// var claims struct {
|
||||||
// ScopesSupported []string `json:"scopes_supported"`
|
// ScopesSupported []string `json:"scopes_supported"`
|
||||||
// ClaimsSupported []string `json:"claims_supported"`
|
// ClaimsSupported []string `json:"claims_supported"`
|
||||||
// }
|
// }
|
||||||
//
|
//
|
||||||
// if err := provider.Claims(&claims); err != nil {
|
// if err := provider.Claims(&claims); err != nil {
|
||||||
// // handle unmarshaling error
|
// // handle unmarshaling error
|
||||||
// }
|
// }
|
||||||
//
|
//
|
||||||
// For a list of fields defined by the OpenID Connect spec see:
|
// For a list of fields defined by the OpenID Connect spec see:
|
||||||
// https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata
|
// https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata
|
||||||
|
@ -256,6 +276,12 @@ func (p *Provider) Endpoint() oauth2.Endpoint {
|
||||||
return oauth2.Endpoint{AuthURL: p.authURL, TokenURL: p.tokenURL}
|
return oauth2.Endpoint{AuthURL: p.authURL, TokenURL: p.tokenURL}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// UserInfoEndpoint returns the OpenID Connect userinfo endpoint for the given
|
||||||
|
// provider.
|
||||||
|
func (p *Provider) UserInfoEndpoint() string {
|
||||||
|
return p.userInfoURL
|
||||||
|
}
|
||||||
|
|
||||||
// UserInfo represents the OpenID Connect userinfo claims.
|
// UserInfo represents the OpenID Connect userinfo claims.
|
||||||
type UserInfo struct {
|
type UserInfo struct {
|
||||||
Subject string `json:"sub"`
|
Subject string `json:"sub"`
|
||||||
|
@ -317,7 +343,7 @@ func (p *Provider) UserInfo(ctx context.Context, tokenSource oauth2.TokenSource)
|
||||||
ct := resp.Header.Get("Content-Type")
|
ct := resp.Header.Get("Content-Type")
|
||||||
mediaType, _, parseErr := mime.ParseMediaType(ct)
|
mediaType, _, parseErr := mime.ParseMediaType(ct)
|
||||||
if parseErr == nil && mediaType == "application/jwt" {
|
if parseErr == nil && mediaType == "application/jwt" {
|
||||||
payload, err := p.remoteKeySet.VerifySignature(ctx, string(body))
|
payload, err := p.remoteKeySet().VerifySignature(ctx, string(body))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("oidc: invalid userinfo jwt signature %v", err)
|
return nil, fmt.Errorf("oidc: invalid userinfo jwt signature %v", err)
|
||||||
}
|
}
|
||||||
|
@ -391,18 +417,17 @@ type IDToken struct {
|
||||||
|
|
||||||
// Claims unmarshals the raw JSON payload of the ID Token into a provided struct.
|
// Claims unmarshals the raw JSON payload of the ID Token into a provided struct.
|
||||||
//
|
//
|
||||||
// idToken, err := idTokenVerifier.Verify(rawIDToken)
|
// idToken, err := idTokenVerifier.Verify(rawIDToken)
|
||||||
// if err != nil {
|
// if err != nil {
|
||||||
// // handle error
|
// // handle error
|
||||||
// }
|
// }
|
||||||
// var claims struct {
|
// var claims struct {
|
||||||
// Email string `json:"email"`
|
// Email string `json:"email"`
|
||||||
// EmailVerified bool `json:"email_verified"`
|
// EmailVerified bool `json:"email_verified"`
|
||||||
// }
|
// }
|
||||||
// if err := idToken.Claims(&claims); err != nil {
|
// if err := idToken.Claims(&claims); err != nil {
|
||||||
// // handle error
|
// // handle error
|
||||||
// }
|
// }
|
||||||
//
|
|
||||||
func (i *IDToken) Claims(v interface{}) error {
|
func (i *IDToken) Claims(v interface{}) error {
|
||||||
if i.claims == nil {
|
if i.claims == nil {
|
||||||
return errors.New("oidc: claims not set")
|
return errors.New("oidc: claims not set")
|
||||||
|
@ -424,7 +449,7 @@ func (i *IDToken) VerifyAccessToken(accessToken string) error {
|
||||||
h = sha256.New()
|
h = sha256.New()
|
||||||
case RS384, ES384, PS384:
|
case RS384, ES384, PS384:
|
||||||
h = sha512.New384()
|
h = sha512.New384()
|
||||||
case RS512, ES512, PS512:
|
case RS512, ES512, PS512, EdDSA:
|
||||||
h = sha512.New()
|
h = sha512.New()
|
||||||
default:
|
default:
|
||||||
return fmt.Errorf("oidc: unsupported signing algorithm %q", i.sigAlgorithm)
|
return fmt.Errorf("oidc: unsupported signing algorithm %q", i.sigAlgorithm)
|
||||||
|
|
46
vendor/github.com/coreos/go-oidc/v3/oidc/verify.go
generated
vendored
46
vendor/github.com/coreos/go-oidc/v3/oidc/verify.go
generated
vendored
|
@ -64,14 +64,13 @@ type IDTokenVerifier struct {
|
||||||
// This constructor can be used to create a verifier directly using the issuer URL and
|
// This constructor can be used to create a verifier directly using the issuer URL and
|
||||||
// JSON Web Key Set URL without using discovery:
|
// JSON Web Key Set URL without using discovery:
|
||||||
//
|
//
|
||||||
// keySet := oidc.NewRemoteKeySet(ctx, "https://www.googleapis.com/oauth2/v3/certs")
|
// keySet := oidc.NewRemoteKeySet(ctx, "https://www.googleapis.com/oauth2/v3/certs")
|
||||||
// verifier := oidc.NewVerifier("https://accounts.google.com", keySet, config)
|
// verifier := oidc.NewVerifier("https://accounts.google.com", keySet, config)
|
||||||
//
|
//
|
||||||
// Or a static key set (e.g. for testing):
|
// Or a static key set (e.g. for testing):
|
||||||
//
|
//
|
||||||
// keySet := &oidc.StaticKeySet{PublicKeys: []crypto.PublicKey{pub1, pub2}}
|
// keySet := &oidc.StaticKeySet{PublicKeys: []crypto.PublicKey{pub1, pub2}}
|
||||||
// verifier := oidc.NewVerifier("https://accounts.google.com", keySet, config)
|
// verifier := oidc.NewVerifier("https://accounts.google.com", keySet, config)
|
||||||
//
|
|
||||||
func NewVerifier(issuerURL string, keySet KeySet, config *Config) *IDTokenVerifier {
|
func NewVerifier(issuerURL string, keySet KeySet, config *Config) *IDTokenVerifier {
|
||||||
return &IDTokenVerifier{keySet: keySet, config: config, issuer: issuerURL}
|
return &IDTokenVerifier{keySet: keySet, config: config, issuer: issuerURL}
|
||||||
}
|
}
|
||||||
|
@ -120,8 +119,22 @@ type Config struct {
|
||||||
InsecureSkipSignatureCheck bool
|
InsecureSkipSignatureCheck bool
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// VerifierContext returns an IDTokenVerifier that uses the provider's key set to
|
||||||
|
// verify JWTs. As opposed to Verifier, the context is used for all requests to
|
||||||
|
// the upstream JWKs endpoint.
|
||||||
|
func (p *Provider) VerifierContext(ctx context.Context, config *Config) *IDTokenVerifier {
|
||||||
|
return p.newVerifier(NewRemoteKeySet(ctx, p.jwksURL), config)
|
||||||
|
}
|
||||||
|
|
||||||
// Verifier returns an IDTokenVerifier that uses the provider's key set to verify JWTs.
|
// Verifier returns an IDTokenVerifier that uses the provider's key set to verify JWTs.
|
||||||
|
//
|
||||||
|
// The returned verifier uses a background context for all requests to the upstream
|
||||||
|
// JWKs endpoint. To control that context, use VerifierContext instead.
|
||||||
func (p *Provider) Verifier(config *Config) *IDTokenVerifier {
|
func (p *Provider) Verifier(config *Config) *IDTokenVerifier {
|
||||||
|
return p.newVerifier(p.remoteKeySet(), config)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *Provider) newVerifier(keySet KeySet, config *Config) *IDTokenVerifier {
|
||||||
if len(config.SupportedSigningAlgs) == 0 && len(p.algorithms) > 0 {
|
if len(config.SupportedSigningAlgs) == 0 && len(p.algorithms) > 0 {
|
||||||
// Make a copy so we don't modify the config values.
|
// Make a copy so we don't modify the config values.
|
||||||
cp := &Config{}
|
cp := &Config{}
|
||||||
|
@ -129,7 +142,7 @@ func (p *Provider) Verifier(config *Config) *IDTokenVerifier {
|
||||||
cp.SupportedSigningAlgs = p.algorithms
|
cp.SupportedSigningAlgs = p.algorithms
|
||||||
config = cp
|
config = cp
|
||||||
}
|
}
|
||||||
return NewVerifier(p.issuer, p.remoteKeySet, config)
|
return NewVerifier(p.issuer, keySet, config)
|
||||||
}
|
}
|
||||||
|
|
||||||
func parseJWT(p string) ([]byte, error) {
|
func parseJWT(p string) ([]byte, error) {
|
||||||
|
@ -193,19 +206,18 @@ func resolveDistributedClaim(ctx context.Context, verifier *IDTokenVerifier, src
|
||||||
//
|
//
|
||||||
// See: https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation
|
// See: https://openid.net/specs/openid-connect-core-1_0.html#IDTokenValidation
|
||||||
//
|
//
|
||||||
// oauth2Token, err := oauth2Config.Exchange(ctx, r.URL.Query().Get("code"))
|
// oauth2Token, err := oauth2Config.Exchange(ctx, r.URL.Query().Get("code"))
|
||||||
// if err != nil {
|
// if err != nil {
|
||||||
// // handle error
|
// // handle error
|
||||||
// }
|
// }
|
||||||
//
|
//
|
||||||
// // Extract the ID Token from oauth2 token.
|
// // Extract the ID Token from oauth2 token.
|
||||||
// rawIDToken, ok := oauth2Token.Extra("id_token").(string)
|
// rawIDToken, ok := oauth2Token.Extra("id_token").(string)
|
||||||
// if !ok {
|
// if !ok {
|
||||||
// // handle error
|
// // handle error
|
||||||
// }
|
// }
|
||||||
//
|
|
||||||
// token, err := verifier.Verify(ctx, rawIDToken)
|
|
||||||
//
|
//
|
||||||
|
// token, err := verifier.Verify(ctx, rawIDToken)
|
||||||
func (v *IDTokenVerifier) Verify(ctx context.Context, rawIDToken string) (*IDToken, error) {
|
func (v *IDTokenVerifier) Verify(ctx context.Context, rawIDToken string) (*IDToken, error) {
|
||||||
// Throw out tokens with invalid claims before trying to verify the token. This lets
|
// Throw out tokens with invalid claims before trying to verify the token. This lets
|
||||||
// us do cheap checks before possibly re-syncing keys.
|
// us do cheap checks before possibly re-syncing keys.
|
||||||
|
|
4
vendor/modules.txt
vendored
4
vendor/modules.txt
vendored
|
@ -129,8 +129,8 @@ github.com/containerd/cgroups/v3/cgroup1
|
||||||
github.com/containerd/cgroups/v3/cgroup1/stats
|
github.com/containerd/cgroups/v3/cgroup1/stats
|
||||||
github.com/containerd/cgroups/v3/cgroup2
|
github.com/containerd/cgroups/v3/cgroup2
|
||||||
github.com/containerd/cgroups/v3/cgroup2/stats
|
github.com/containerd/cgroups/v3/cgroup2/stats
|
||||||
# github.com/coreos/go-oidc/v3 v3.5.0
|
# github.com/coreos/go-oidc/v3 v3.6.0
|
||||||
## explicit; go 1.14
|
## explicit; go 1.19
|
||||||
github.com/coreos/go-oidc/v3/oidc
|
github.com/coreos/go-oidc/v3/oidc
|
||||||
# github.com/coreos/go-systemd/v22 v22.3.2
|
# github.com/coreos/go-systemd/v22 v22.3.2
|
||||||
## explicit; go 1.12
|
## explicit; go 1.12
|
||||||
|
|
Loading…
Reference in a new issue