5.3 KiB
Authority Revocation Bundle
The Authority service exports revocation information as an offline-friendly JSON document plus a detached JWS signature. Operators can mirror the bundle alongside Feedser exports to ensure air-gapped scanners receive the latest token, subject, and client revocations.
File layout
| Artefact | Description |
|---|---|
revocation-bundle.json |
Canonical JSON document describing revoked entities. Validates against etc/authority/revocation_bundle.schema.json. |
revocation-bundle.json.jws |
Detached JWS signature covering the exact UTF-8 bytes of revocation-bundle.json. |
revocation-bundle.json.sha256 |
Hex-encoded SHA-256 digest used by mirror automation (optional but recommended). |
All hashes and signatures are generated after applying the deterministic formatting rules below.
Deterministic formatting rules
- JSON is serialised with UTF-8 encoding, 2-space indentation, and lexicographically sorted object keys.
- Arrays are sorted by deterministic keys:
- Top-level
revocationssorted by (category,id,revokedAt). - Nested arrays (
scopes) sorted ascending, unique enforced.
- Top-level
- Numeric values (
sequence) are emitted without leading zeros. - Timestamps use UTC ISO-8601 format with
Zsuffix.
Consumers MUST treat the combination of schemaVersion and sequence as a monotonic feed. Bundles with older sequence values are ignored unless bundleId differs and issuedAt is newer (supporting replay detection).
Revocation entry categories
| Category | Description | Required fields |
|---|---|---|
token |
A single OAuth token (access, refresh, device, authorization code). | tokenType, clientId, revokedAt, optional subjectId |
subject |
All credentials issued to a subject (user/service account). | subjectId, revokedAt |
client |
Entire OAuth client registration is revoked. | clientId, revokedAt |
key |
Signing/encryption key material revoked. | id, revokedAt |
reason is a machine-friendly code (compromised, rotation, policy, lifecycle, etc). reasonDescription may include a short operator note.
Detached JWS workflow
- Serialise
revocation-bundle.jsonusing the deterministic rules. - Compute SHA-256 digest; write to
revocation-bundle.json.sha256. - Sign using ES256 (default) with the configured Authority signing key. The JWS header uses:
{ "alg": "ES256", "kid": "{signingKeyId}", "provider": "{providerName}", "typ": "application/vnd.stellaops.revocation-bundle+jws", "b64": false, "crit": ["b64"] } - Persist the detached signature payload to
revocation-bundle.json.jws(per RFC 7797).
Verification steps:
- Validate
revocation-bundle.jsonagainst the schema. - Re-compute SHA-256 and compare with
.sha256(if present). - Resolve the signing key from JWKS (
/.well-known/jwks.json) or the offline key bundle, preferring the provider declared in the JWS header (providerfalls back todefault). - Verify the detached JWS using the resolved provider. The CLI mirrors Authority resolution, so builds compiled with
StellaOpsCryptoSodium=trueautomatically use the libsodium provider when advertised; otherwise verification downgrades to the managed fallback.
CLI verification workflow
Use the bundled CLI command before distributing a bundle:
stellaops auth revoke verify \
--bundle artifacts/revocation-bundle.json \
--signature artifacts/revocation-bundle.json.jws \
--key etc/authority/signing/authority-public.pem \
--verbose
The verifier performs three checks:
- Prints the computed digest in
sha256:<hex>format. Compare it with the exported.sha256artefact. - Confirms the detached JWS header advertises
b64: false, captures the provider hint, and that the algorithm matches the Authority configuration (ES256 unless overridden). - Registers the supplied PEM key with the crypto provider registry and validates the signature (falling back to the managed provider when the hinted provider is unavailable).
A zero exit code means the bundle is ready for mirroring/import. Non-zero codes signal missing arguments, malformed JWS payloads, or signature mismatches; regenerate or re-sign the bundle before distribution.
Example
The repository contains an example bundle demonstrating a mixed export of token, subject, and client revocations. Use it as a reference for integration tests and tooling.
Operations Quick Reference
stella auth revoke exportemits a canonical JSON bundle,.sha256digest, and detached JWS signature in one command. Use--outputto write into your mirror staging directory.stella auth revoke verifyvalidates a bundle using cached JWKS or an offline PEM key, honours theprovidermetadata embedded in the signature, and reports digest mismatches before distribution.POST /internal/revocations/exportprovides the same payload for orchestrators that already talk to the bootstrap API.POST /internal/signing/rotaterotates JWKS material without downtime; always export a fresh bundle afterward so downstream mirrors receive signatures from the newkid.- Offline Kit automation should mirror
revocation-bundle.json*alongside Feedser exports so agents ingest revocations during the same sync pass.