Skip to content

Conversation

@biscoe916
Copy link
Member

No description provided.

@biscoe916 biscoe916 requested a review from a team as a code owner March 19, 2024 18:30
Copy link
Contributor

@mkleene mkleene left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

looks good once you take care of any build stuff, found this in the logs:

Error: auth/token_adding_interceptor_test.go:119:34: cannot use &ts (value of type *FakeTokenSource) as AccessTokenSource value in argument to NewTokenAddingInterceptor: *FakeTokenSource does not implement AccessTokenSource (missing method EncryptionPublicKeyPEM)

// more closely linked to what happens in KAS in terms of crypto params
DecryptWithDPoPKey(data []byte) ([]byte, error)
MakeToken(func(jwk.Key) ([]byte, error)) ([]byte, error)
DPoPPublicKeyPEM() string
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can get rid of DPoPPublicKeyPEM, I think

Copy link
Member

@strantalis strantalis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am not sure the asym keys used for kas rewrap encryption should be on the IDP Access token. Those should get created and stored when we load a tdf. They have nothing to do with the oauth flow imo.

@dmihalcik-virtru dmihalcik-virtru changed the title added a new encryption keypair fix(security): adds a new encryption keypair Mar 20, 2024
@strantalis
Copy link
Member

#461 resolves this.

@strantalis strantalis closed this Mar 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants