Module: OmniauthOpenidFederation::Federation::EntityStatementHelper
- Defined in:
- lib/omniauth_openid_federation/federation/entity_statement_helper.rb
Class Method Summary collapse
-
.parse_for_signed_jwks(entity_statement_path) ⇒ Hash
Parse entity statement and extract signed_jwks_uri and entity_jwks This is a common operation used in multiple places.
-
.parse_for_signed_jwks_from_content(entity_statement_content) ⇒ Hash
Parse entity statement from content string (JWT) This is used when entity statement is fetched from URL and cached in memory.
Class Method Details
.parse_for_signed_jwks(entity_statement_path) ⇒ Hash
Parse entity statement and extract signed_jwks_uri and entity_jwks This is a common operation used in multiple places
18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 |
# File 'lib/omniauth_openid_federation/federation/entity_statement_helper.rb', line 18 def self.parse_for_signed_jwks(entity_statement_path) # Determine allowed directories for file path validation # If path is absolute and exists, allow it (for temp files in tests) # For absolute paths that don't exist, validate path traversal but allow outside allowed_dirs # For relative paths, validate against allowed directories path_str = entity_statement_path.to_s is_absolute = path_str.start_with?("/", "~") if is_absolute && File.exist?(entity_statement_path) validated_path = entity_statement_path elsif is_absolute # Absolute path - validate path traversal but allow outside allowed_dirs begin validated_path = Utils.validate_file_path!( entity_statement_path, allowed_dirs: nil # Allow absolute paths outside config directory ) rescue SecurityError => e OmniauthOpenidFederation::Logger.warn("[EntityStatementHelper] Security error: #{e.message}") return nil end else # Relative path - must be in allowed directories config = Configuration.config allowed_dirs = if defined?(Rails) && Rails.root [Rails.root.join("config").to_s] elsif config.root_path [File.join(config.root_path, "config")] end begin # Validate file path to prevent path traversal validated_path = Utils.validate_file_path!( entity_statement_path, allowed_dirs: allowed_dirs ) rescue SecurityError => e # For relative paths with path traversal, raise SecurityError instead of returning nil # This is a security violation that should be explicitly handled OmniauthOpenidFederation::Logger.warn("[EntityStatementHelper] Security error: #{e.message}") raise SecurityError, e. end end unless File.exist?(validated_path) sanitized_path = Utils.sanitize_path(validated_path) OmniauthOpenidFederation::Logger.warn("[EntityStatementHelper] Entity statement file not found: #{sanitized_path}") return nil end begin entity_statement_content = File.read(validated_path) entity_statement = EntityStatement.new(entity_statement_content) = entity_statement.parse signed_jwks_uri = .dig(:metadata, :openid_provider, :signed_jwks_uri) entity_jwks = [:jwks] { signed_jwks_uri: signed_jwks_uri, entity_jwks: entity_jwks, metadata: } rescue => e sanitized_path = Utils.sanitize_path(validated_path) OmniauthOpenidFederation::Logger.error("[EntityStatementHelper] Failed to parse entity statement from #{sanitized_path}: #{e.class} - #{e.message}") raise ValidationError, "Failed to parse entity statement: #{e.message}", e.backtrace end end |
.parse_for_signed_jwks_from_content(entity_statement_content) ⇒ Hash
Parse entity statement from content string (JWT) This is used when entity statement is fetched from URL and cached in memory
94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 |
# File 'lib/omniauth_openid_federation/federation/entity_statement_helper.rb', line 94 def self.parse_for_signed_jwks_from_content(entity_statement_content) return nil unless entity_statement_content&.is_a?(String) begin entity_statement = EntityStatement.new(entity_statement_content) = entity_statement.parse signed_jwks_uri = .dig(:metadata, :openid_provider, :signed_jwks_uri) entity_jwks = [:jwks] { signed_jwks_uri: signed_jwks_uri, entity_jwks: entity_jwks, metadata: } rescue => e OmniauthOpenidFederation::Logger.error("[EntityStatementHelper] Failed to parse entity statement from content: #{e.class} - #{e.message}") raise ValidationError, "Failed to parse entity statement: #{e.message}", e.backtrace end end |