Skip to content

Refactor JWKS endpoint to support mixed RSA and EdDSA keystores#3058

Open
udeepa15 wants to merge 2 commits intowso2-extensions:masterfrom
udeepa15:oid4vp-clean
Open

Refactor JWKS endpoint to support mixed RSA and EdDSA keystores#3058
udeepa15 wants to merge 2 commits intowso2-extensions:masterfrom
udeepa15:oid4vp-clean

Conversation

@udeepa15
Copy link
Copy Markdown
Contributor

Proposed changes in this pull request

When the keystore holds both RSA and EdDSA (Ed25519/Ed448) key pairs the old code cast every public key unconditionally to RSAPublicKey, which would throw a ClassCastException at runtime for EdDSA entries. These commits make the JWKS endpoint safe to operate with a mixed-algorithm keystore.

error

[2026-02-24 13:56:05,526] [b8734d76-7a67-4311-9208-9f899a4cbc49] ERROR {org.wso2.carbon.identity.oauth.endpoint.jwks.JwksEndpoint} - Error while generating the keyset for tenant domain: carbon.super java.lang.ClassCastException: class org.bouncycastle.jcajce.provider.asymmetric.edec.BC15EdDSAPublicKey cannot be cast to class java.security.interfaces.RSAPublicKey (org.bouncycastle.jcajce.provider.asymmetric.edec.BC15EdDSAPublicKey is in unnamed module of loader org.eclipse.osgi.internal.loader.EquinoxClassLoader @341eb5db; java.security.interfaces.RSAPublicKey is in module java.base of loader 'bootstrap')
	at org.wso2.carbon.identity.oauth.endpoint.jwks.JwksEndpoint.getJWK(JwksEndpoint.java:149)
	at org.wso2.carbon.identity.oauth.endpoint.jwks.JwksEndpoint.populateJWKSArray(JwksEndpoint.java:138)
	at org.wso2.carbon.identity.oauth.endpoint.jwks.JwksEndpoint.buildResponse(JwksEndpoint.java:112)
	at org.wso2.carbon.identity.oauth.endpoint.jwks.JwksEndpoint.jwks(JwksEndpoint.java:94)
	at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:103)
	at java.base/java.lang.reflect.Method.invoke(Method.java:580)
	at org.apache.cxf.service.invoker.AbstractInvoker.performInvocation(AbstractInvoker.java:179)
	at org.apache.cxf.service.invoker.AbstractInvoker.invoke(AbstractInvoker.java:96)
	at org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:201)
	at org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:104)
	at org.apache.cxf.interceptor.ServiceInvokerInterceptor$1.run(ServiceInvokerInterceptor.java:59)
	at org.apache.cxf.interceptor.ServiceInvokerInterceptor.handleMessage(ServiceInvokerInterceptor.java:96)
	at org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307)
	at org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:121)
	at org.apache.cxf.transport.http.AbstractHTTPDestination.invoke(AbstractHTTPDestination.java:267)
	at org.apache.cxf.transport.servlet.ServletController.invokeDestination(ServletController.java:234)
	at org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:208)
	at org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:160)
	at org.apache.cxf.transport.servlet.CXFNonSpringServlet.invoke(CXFNonSpringServlet.java:225)
	at org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest(AbstractHTTPServlet.java:304)
	at org.apache.cxf.transport.servlet.AbstractHTTPServlet.doGet(AbstractHTTPServlet.java:222)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:529)
	at org.apache.cxf.transport.servlet.AbstractHTTPServlet.service(AbstractHTTPServlet.java:279)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:197)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:142)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:51)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:142)
	at org.wso2.carbon.webapp.mgt.filter.AuthorizationHeaderFilter.doFilter(AuthorizationHeaderFilter.java:128)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:142)
	at org.wso2.carbon.tomcat.ext.filter.ContentTypeBasedCachePreventionFilter.doFilter(ContentTypeBasedCachePreventionFilter.java:51)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:142)
	at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:129)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:166)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:142)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:166)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:88)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:481)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127)
	at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:168)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:83)
	at org.wso2.carbon.identity.context.rewrite.valve.OrganizationContextRewriteValve.invoke(OrganizationContextRewriteValve.java:123)
	at org.wso2.carbon.tomcat.ext.valves.SameSiteCookieValve.invoke(SameSiteCookieValve.java:38)
	at org.wso2.carbon.identity.cors.valve.CORSValve.invoke(CORSValve.java:83)
	at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:209)
	at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:132)
	at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:110)
	at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:49)
	at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:71)
	at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:150)
	at org.wso2.carbon.extension.identity.x509Certificate.valve.X509CertificateAuthenticationValve.invoke(X509CertificateAuthenticationValve.java:63)
	at org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:643)
	at org.wso2.carbon.identity.core.context.valve.IdentityContextCreatorValve.invoke(IdentityContextCreatorValve.java:55)
	at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:63)
	at org.wso2.carbon.tomcat.ext.valves.RequestEncodingValve.invoke(RequestEncodingValve.java:49)
	at org.wso2.carbon.tomcat.ext.valves.RequestCorrelationIdValve.invoke(RequestCorrelationIdValve.java:137)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:72)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:344)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:398)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:63)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:939)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1831)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:52)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:973)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:491)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:63)
	at java.base/java.lang.Thread.run(Thread.java:1583)

1. Key Type Guard (JwksEndpoint.java)

  • Added instanceof RSAPublicKey check before casting
  • Non-RSA keys return null and are skipped
  • Debug log: "Skipping non-RSA key for alias: X, algorithm: EdDSA (EdDSA/EC keys are served via separate endpoint)"

2. Type Safety Improvements

  • Replaced net.minidev.json.JSONArrayList<Map<String, Object>> for type safety
  • Changed return type: RSAKey.BuilderJWK (return fully built objects)
  • Added null check before adding to JWKS array

3. Code Quality Refactoring

  • Extracted thumbprint logic to dedicated addThumbprints() method
  • Simplified KID assignment from multiple setters to ternary expression
  • Renamed variables for clarity (jwkbuilder)

4. Configuration Consolidation

  • Removed JwksEndpoint.JWKS_IS_X5T_REQUIRED constant
  • Migrated to centralized OAuth2Util.JWT_X5T_ENABLED
  • Aligns x5t configuration across JWT issuance and JWKS publication

5. Test Cleanup

  • Updated JwksEndpointTest.java to use centralized constant
  • All existing tests pass without modification

###JWKS Payload
-before the changes

{
    "keys": [
        {
            "kty": "RSA",
            "x5t#S256": "5BNgTKknlt2OyS9OYrCvoQiegJAHqSReu4cz12nUWoo",
            "e": "AQAB",
            "use": "sig",
            "kid": "ZTQxMzYwNGNhOTI3OTZkZDhlYzkyZjRlNjJiMGFmYTEwODllODA5MDA3YTkyNDVlYmI4NzMzZDc2OWQ0NWE4YQ_RS256",
            "x5c": [
                "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"
            ],
            "alg": "RS256",
            "n": "pKrcXnoAU82tf7lfrK7nXly0NXGuooK5976cApos9eKFd3I2ln7PEZEkeW5U-bsx_fSYBnSlf4rCD3xGI79H86dfJm6xewMeYkGW-gq_qyBJWR-qB4MSbh0LRci3swpVMfV4C-4jOJ0QmSjpr04toXz-yRO1YQIfZnO8ESlSby2gxnaimAkgjdv4pZJv4SK2YEQiOsUkYklRckMxVO3g_l4RIP83yBRLJaU5IiY_0YyKeR3XIM1QDv-0ZzI13MSPhb2TYzHevwgZ9cPnADMBT_RtRg9y5jscA-A_FdDcZ_QLsrWMYNqp9AlNBvKssrqZQ6PrfA-YngYu9rXIG3BuUw"
        }
    ]
}

-after the changes

{
    "keys": [
        {
            "kty": "RSA",
            "x5t#S256": "5BNgTKknlt2OyS9OYrCvoQiegJAHqSReu4cz12nUWoo",
            "e": "AQAB",
            "use": "sig",
            "kid": "ZTQxMzYwNGNhOTI3OTZkZDhlYzkyZjRlNjJiMGFmYTEwODllODA5MDA3YTkyNDVlYmI4NzMzZDc2OWQ0NWE4YQ_RS256",
            "x5c": [
                "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"
            ],
            "alg": "RS256",
            "n": "pKrcXnoAU82tf7lfrK7nXly0NXGuooK5976cApos9eKFd3I2ln7PEZEkeW5U-bsx_fSYBnSlf4rCD3xGI79H86dfJm6xewMeYkGW-gq_qyBJWR-qB4MSbh0LRci3swpVMfV4C-4jOJ0QmSjpr04toXz-yRO1YQIfZnO8ESlSby2gxnaimAkgjdv4pZJv4SK2YEQiOsUkYklRckMxVO3g_l4RIP83yBRLJaU5IiY_0YyKeR3XIM1QDv-0ZzI13MSPhb2TYzHevwgZ9cPnADMBT_RtRg9y5jscA-A_FdDcZ_QLsrWMYNqp9AlNBvKssrqZQ6PrfA-YngYu9rXIG3BuUw"
        }
    ]
}

Developer Checklist (Mandatory)

  • Complete the Developer Checklist in the related product-is issue to track any behavioral change or migration impact.

Checklist (for reviewing)

General

  • Is this PR explained thoroughly? All code changes must be accounted for in the PR description.
  • Is the PR labeled correctly?

Functionality

  • Are all requirements met? Compare implemented functionality with the requirements specification.
  • Does the UI work as expected? There should be no Javascript errors in the console; all resources should load. There should be no unexpected errors. Deliberately try to break the feature to find out if there are corner cases that are not handled.

Code

  • Do you fully understand the introduced changes to the code? If not ask for clarification, it might uncover ways to solve a problem in a more elegant and efficient way.
  • Does the PR introduce any inefficient database requests? Use the debug server to check for duplicate requests.
  • Are all necessary strings marked for translation? All strings that are exposed to users via the UI must be marked for translation.

Tests

  • Are there sufficient test cases? Ensure that all components are tested individually; models, forms, and serializers should be tested in isolation even if a test for a view covers these components.
  • If this is a bug fix, are tests for the issue in place? There must be a test case for the bug to ensure the issue won’t regress. Make sure that the tests break without the new code to fix the issue.
  • If this is a new feature or a significant change to an existing feature? has the manual testing spreadsheet been updated with instructions for manual testing?

Security

  • Confirm this PR doesn't commit any keys, passwords, tokens, usernames, or other secrets.
  • Are all UI and API inputs run through forms or serializers?
  • Are all external inputs validated and sanitized appropriately?
  • Does all branching logic have a default case?
  • Does this solution handle outliers and edge cases gracefully?
  • Are all external communications secured and restricted to SSL?

Documentation

  • Are changes to the UI documented in the platform docs? If this PR introduces new platform site functionality or changes existing ones, the changes should be documented.
  • Are changes to the API documented in the API docs? If this PR introduces new API functionality or changes existing ones, the changes must be documented.
  • Are reusable components documented? If this PR introduces components that are relevant to other developers (for instance a mixin for a view or a generic form) they should be documented in the Wiki.

Replace raw JSONArray usage with a typed List<Map<String,Object>> and switch from returning RSAKey.Builder to built JWK objects. Skip non-RSA public keys (EdDSA/EC are served separately), centralize thumbprint logic into addThumbprints(), and use OAuth2Util.JWT_X5T_ENABLED for x5t config checks. Adjust deprecated old-KID creation to the new collection type. Update tests: add a test JwksEndpoint class and modify imports/usages to reflect the JWT_X5T_ENABLED config constant.
Delete JwksEndpoint.java from components/org.wso2.carbon.identity.oauth.endpoint/src/test/java/org/wso2/carbon/identity/oauth/endpoint/jwks. This removes the JWKS endpoint test implementation (previously a ~308-line test class) from the oauth endpoint module.
Comment on lines +105 to 106
List<Map<String, Object>> jwksArray = new ArrayList<>();
JSONObject jwksJson = new JSONObject();
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Log Improvement Suggestion No: 1

Suggested change
List<Map<String, Object>> jwksArray = new ArrayList<>();
JSONObject jwksJson = new JSONObject();
JSONObject jwksJson = new JSONObject();
OAuthServerConfiguration config = OAuthServerConfiguration.getInstance();
log.info("Building JWKS response for tenant: " + getTenantDomain());

Comment on lines +153 to +163
PublicKey publicKey = certificate.getPublicKey();

// Only handle RSA keys - EdDSA and EC keys are served via separate endpoint
if (!(publicKey instanceof RSAPublicKey)) {
if (log.isDebugEnabled()) {
log.debug("Skipping non-RSA key for alias: " + alias +
", algorithm: " + publicKey.getAlgorithm() +
" (EdDSA/EC keys are served via separate endpoint)");
}
return null;
}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Log Improvement Suggestion No: 2

Suggested change
PublicKey publicKey = certificate.getPublicKey();
// Only handle RSA keys - EdDSA and EC keys are served via separate endpoint
if (!(publicKey instanceof RSAPublicKey)) {
if (log.isDebugEnabled()) {
log.debug("Skipping non-RSA key for alias: " + alias +
", algorithm: " + publicKey.getAlgorithm() +
" (EdDSA/EC keys are served via separate endpoint)");
}
return null;
}
PublicKey publicKey = certificate.getPublicKey();
// Only handle RSA keys - EdDSA and EC keys are served via separate endpoint
if (!(publicKey instanceof RSAPublicKey)) {
if (log.isDebugEnabled()) {
log.debug("Skipping non-RSA key for alias: " + alias +
", algorithm: " + publicKey.getAlgorithm() +
" (EdDSA/EC keys are served via separate endpoint)");
}
return null;
}
if (log.isDebugEnabled()) {
log.debug("Creating JWK for RSA certificate with alias: " + alias + ", algorithm: " + algorithm);
}

Copy link
Copy Markdown
Contributor

@wso2-engineering wso2-engineering bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AI Agent Log Improvement Checklist

⚠️ Warning: AI-Generated Review Comments

  • The log-related comments and suggestions in this review were generated by an AI tool to assist with identifying potential improvements. Purpose of reviewing the code for log improvements is to improve the troubleshooting capabilities of our products.
  • Please make sure to manually review and validate all suggestions before applying any changes. Not every code suggestion would make sense or add value to our purpose. Therefore, you have the freedom to decide which of the suggestions are helpful.

✅ Before merging this pull request:

  • Review all AI-generated comments for accuracy and relevance.
  • Complete and verify the table below. We need your feedback to measure the accuracy of these suggestions and the value they add. If you are rejecting a certain code suggestion, please mention the reason briefly in the suggestion for us to capture it.
Comment Accepted (Y/N) Reason
#### Log Improvement Suggestion No: 1
#### Log Improvement Suggestion No: 2

@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Feb 24, 2026

CLA assistant check
All committers have signed the CLA.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants