Module: OmniauthOpenidFederation::Federation::EntityStatementHelper

Defined in:
lib/omniauth_openid_federation/federation/entity_statement_helper.rb

Class Method Summary collapse

Class Method Details

.parse_for_signed_jwks(entity_statement_path) ⇒ Hash

Parse entity statement and extract signed_jwks_uri and entity_jwks This is a common operation used in multiple places

Parameters:

  • Path to entity statement file

Returns:

  • Hash with :signed_jwks_uri and :entity_jwks keys, or nil if not found

Raises:

  • If path validation fails

  • If parsing fails



18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
# File 'lib/omniauth_openid_federation/federation/entity_statement_helper.rb', line 18

def self.parse_for_signed_jwks(entity_statement_path)
  # Determine allowed directories for file path validation
  # If path is absolute and exists, allow it (for temp files in tests)
  # For absolute paths that don't exist, validate path traversal but allow outside allowed_dirs
  # For relative paths, validate against allowed directories
  path_str = entity_statement_path.to_s
  is_absolute = path_str.start_with?("/", "~")

  if is_absolute && File.exist?(entity_statement_path)
    validated_path = entity_statement_path
  elsif is_absolute
    # Absolute path - validate path traversal but allow outside allowed_dirs
    begin
      validated_path = Utils.validate_file_path!(
        entity_statement_path,
        allowed_dirs: nil  # Allow absolute paths outside config directory
      )
    rescue SecurityError => e
      OmniauthOpenidFederation::Logger.warn("[EntityStatementHelper] Security error: #{e.message}")
      return nil
    end
  else
    # Relative path - must be in allowed directories
    config = Configuration.config
    allowed_dirs = if defined?(Rails) && Rails.root
      [Rails.root.join("config").to_s]
    elsif config.root_path
      [File.join(config.root_path, "config")]
    end

    begin
      # Validate file path to prevent path traversal
      validated_path = Utils.validate_file_path!(
        entity_statement_path,
        allowed_dirs: allowed_dirs
      )
    rescue SecurityError => e
      # For relative paths with path traversal, raise SecurityError instead of returning nil
      # This is a security violation that should be explicitly handled
      OmniauthOpenidFederation::Logger.warn("[EntityStatementHelper] Security error: #{e.message}")
      raise SecurityError, e.message
    end
  end

  unless File.exist?(validated_path)
    sanitized_path = Utils.sanitize_path(validated_path)
    OmniauthOpenidFederation::Logger.warn("[EntityStatementHelper] Entity statement file not found: #{sanitized_path}")
    return nil
  end

  begin
    entity_statement_content = File.read(validated_path)
    entity_statement = EntityStatement.new(entity_statement_content)
     = entity_statement.parse

    signed_jwks_uri = .dig(:metadata, :openid_provider, :signed_jwks_uri)
    entity_jwks = [:jwks]

    {
      signed_jwks_uri: signed_jwks_uri,
      entity_jwks: entity_jwks,
      metadata: 
    }
  rescue => e
    sanitized_path = Utils.sanitize_path(validated_path)
    OmniauthOpenidFederation::Logger.error("[EntityStatementHelper] Failed to parse entity statement from #{sanitized_path}: #{e.class} - #{e.message}")
    raise ValidationError, "Failed to parse entity statement: #{e.message}", e.backtrace
  end
end

.parse_for_signed_jwks_from_content(entity_statement_content) ⇒ Hash

Parse entity statement from content string (JWT) This is used when entity statement is fetched from URL and cached in memory

Parameters:

  • Entity statement JWT string

Returns:

  • Hash with :signed_jwks_uri and :entity_jwks keys, or nil if not found

Raises:

  • If parsing fails



94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
# File 'lib/omniauth_openid_federation/federation/entity_statement_helper.rb', line 94

def self.parse_for_signed_jwks_from_content(entity_statement_content)
  return nil unless entity_statement_content&.is_a?(String)

  begin
    entity_statement = EntityStatement.new(entity_statement_content)
     = entity_statement.parse

    signed_jwks_uri = .dig(:metadata, :openid_provider, :signed_jwks_uri)
    entity_jwks = [:jwks]

    {
      signed_jwks_uri: signed_jwks_uri,
      entity_jwks: entity_jwks,
      metadata: 
    }
  rescue => e
    OmniauthOpenidFederation::Logger.error("[EntityStatementHelper] Failed to parse entity statement from content: #{e.class} - #{e.message}")
    raise ValidationError, "Failed to parse entity statement: #{e.message}", e.backtrace
  end
end