Closed
Bug 1559471
Opened 6 years ago
Closed 6 years ago
Provide a JWT private key to web-server
Categories
(Taskcluster :: Services, defect)
Taskcluster
Services
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: dustin, Assigned: dustin)
Details
In my deployment:
{"EnvVersion":"2.0","Fields":{"code":"ERR_ASSERTION","expected":true,"generatedMessage":false,"message":"jwt.generate requires a privateKey","name":"AssertionError [ERR_ASSERTION]","operator":"==","stack":"AssertionError [ERR_ASSERTION]: jwt.generate requires a privateKey\n at Object.generate (/app/services/web-server/src/utils/jwt.js:12:5)\n at Strategy.passport.use.Strategy [as _verify] (/app/services/web-server/src/login/strategies/github.js:89:77)\n at process._tickCallback (internal/process/next_tick.js:68:7)","v":1},"Hostname":"taskcluster-web-server-web-7c84b759db-tcrps","Logger":"taskcluster.web-server","Pid":1,"Severity":3,"Timestamp":1560538493056000000,"Type":"monitor.error","message":"AssertionError [ERR_ASSERTION]: jwt.generate requires a privateKey\n at Object.generate (/app/services/web-server/src/utils/jwt.js:12:5)\n at Strategy.passport.use.Strategy [as _verify] (/app/services/web-server/src/login/strategies/github.js:89:77)\n at process._tickCallback (internal/process/next_tick.js:68:7)","serviceContext":{"service":"web-server","version":"v14.1.0"},"severity":"ERROR"}
| Assignee | ||
Comment 1•6 years ago
|
||
This is currently using RSA256 which uses asymmetric keys for the signature. Since the same process is both generating and verifying the JWT, we can probably use something symmetric like HS256. An additional advantage would be that it's much easier to generate a signing key for such a thing.
| Assignee | ||
Comment 2•6 years ago
|
||
| Assignee | ||
Updated•6 years ago
|
Status: NEW → RESOLVED
Closed: 6 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•