Skip to content
Snippets Groups Projects
Commit 16583925 authored by Ben Adida's avatar Ben Adida
Browse files

fixed verification of primaries

parent 53f6db27
No related branches found
No related tags found
No related merge requests found
......@@ -140,28 +140,23 @@ function retrieveHostPublicKey(host, successCB, errorCB) {
function verify(assertion, audience, successCB, errorCB, pkRetriever) {
// assertion is bundle
var bundle = vep.unbundleCertsAndAssertion(assertion);
var theIssuer;
jwcert.JWCert.verifyChain(bundle.certificates, function(issuer, next) {
console.log("ISSUER is " + issuer);
// for now, only support the browserid.org issuer
if (issuer != configuration.get('hostname')) {
// allow other retrievers for now for testing
//
// retrieve the public key for the issuer and
// pass it to the continuation
if (pkRetriever)
pkRetriever(issuer, next);
else
next(null);
return;
theIssuer = issuer;
// allow other retrievers for testing
if (pkRetriever)
pkRetriever(issuer, next);
else
retrieveHostPublicKey(issuer, next, function(err) {next(null);});
}, function(pk, principal) {
// primary?
if (theIssuer != configuration.get('hostname')) {
// then the email better match the issuer
if (!principal.email.match("@" + theIssuer + "$"))
return errorCB();
}
// retrieve the public key for real
retrieveHostPublicKey(issuer, next, function(err) {
next(null);
});
}, function(pk, principal) {
var tok = new jwt.JWT();
tok.parse(bundle.assertion);
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment