Implements FED-010: Agent Spawn via Federation feature that enables spawning and managing Claude agents on remote federated Mosaic Stack instances via COMMAND message type. Features: - Federation agent command types (spawn, status, kill) - FederationAgentService for handling agent operations - Integration with orchestrator's agent spawner/lifecycle services - API endpoints for spawning, querying status, and killing agents - Full command routing through federation COMMAND infrastructure - Comprehensive test coverage (12/12 tests passing) Architecture: - Hub → Spoke: Spawn agents on remote instances - Command flow: FederationController → FederationAgentService → CommandService → Remote Orchestrator - Response handling: Remote orchestrator returns agent status/results - Security: Connection validation, signature verification Files created: - apps/api/src/federation/types/federation-agent.types.ts - apps/api/src/federation/federation-agent.service.ts - apps/api/src/federation/federation-agent.service.spec.ts Files modified: - apps/api/src/federation/command.service.ts (agent command routing) - apps/api/src/federation/federation.controller.ts (agent endpoints) - apps/api/src/federation/federation.module.ts (service registration) - apps/orchestrator/src/api/agents/agents.controller.ts (status endpoint) - apps/orchestrator/src/api/agents/agents.module.ts (lifecycle integration) Testing: - 12/12 tests passing for FederationAgentService - All command service tests passing - TypeScript compilation successful - Linting passed Refs #93 Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2.9 KiB
2.9 KiB
Issue #86: [FED-003] Authentik OIDC Integration - Security Fixes
Code Review Findings
The initial implementation (commit 6878d57) was high quality but included placeholder implementations for security-critical functions. This document tracks the completion of those implementations.
Security-Critical Issues
1. JWT Token Validation (CRITICAL)
Problem: validateToken() always returns valid: false
Risk: Cannot verify authenticity of federated tokens
Solution: Implement proper JWT validation with signature verification
2. OIDC Discovery (CRITICAL)
Problem: generateAuthUrl() returns hardcoded placeholder URL
Risk: Cannot initiate real federated authentication flows
Solution: Implement OIDC discovery and proper authorization URL generation
Implementation Plan
1. Add Dependencies
- Add
joselibrary for JWT handling (industry-standard, secure)
2. Implement JWT Validation
- Fetch OIDC discovery metadata from issuer
- Cache JWKS (JSON Web Key Set) for performance
- Verify JWT signature using remote public key
- Validate standard claims (iss, aud, exp, iat)
- Extract user identity from token
- Handle expired tokens gracefully
- Return proper validation results
3. Implement OIDC Discovery
- Fetch
.well-known/openid-configurationfrom remote instance - Cache discovery metadata
- Generate proper OAuth2 authorization URL
- Add PKCE (code_challenge, code_verifier) for security
- Include proper state parameter for CSRF protection
- Support standard OIDC scopes (openid, profile, email)
4. Update Tests
- Replace mock-based tests with real behavior tests
- Test valid JWT validation
- Test expired/invalid token rejection
- Test OIDC discovery and URL generation
- Test PKCE parameter generation
- Maintain 85%+ test coverage
5. Security Considerations
- Cache JWKS to avoid excessive network calls
- Validate token expiration strictly
- Use PKCE to prevent authorization code interception
- Validate issuer matches expected remote instance
- Validate audience matches our instance ID
- Handle network failures gracefully
Implementation Notes
PKCE Flow:
- Generate random code_verifier (base64url-encoded random bytes)
- Generate code_challenge = base64url(SHA256(code_verifier))
- Store code_verifier in session/database
- Include code_challenge in authorization URL
- Send code_verifier in token exchange
JWT Validation Flow:
- Parse JWT without verification to get header
- Fetch JWKS from issuer (cache for 1 hour)
- Find matching key by kid (key ID)
- Verify signature using public key
- Validate claims (iss, aud, exp, iat, nbf)
- Extract user identity (sub, email, etc.)
Progress
- Add jose library
- Implement validateToken()
- Implement generateAuthUrl()
- Add PKCE support
- Update tests
- Verify all tests pass
- Commit security fixes