Allow to customize JWT token algorithm for OIDC and OIDC client #21201
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR follows #21192 - makes it possible to customize a token signature algorithm by using
quarkus.oidc.credentials.jwt
orquarkus.oidc-client.credentials.jwt
scopedsignature-algorithm
property to make it more flexible as opposed to relying on a global property.We have already have 3 separate JWT authentication oidc-client and oidc tests so rather than creating a new one I just modified the existing one - the secret key which is used has length
512 bits
or more - so it just worked - I can confirm that if trim this key a bit then I seePR itself is very simple - just adds a
signature-algorithm
property and updates the JWT JWS builder if it is set