ProcessLtiMessage.java 3.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. package riomhaire.lti.business.actions;
  2. import com.auth0.jwt.JWT;
  3. import lombok.Builder;
  4. import lombok.extern.slf4j.Slf4j;
  5. import org.springframework.web.servlet.ModelAndView;
  6. import riomhaire.lti.adapters.token.JWKBasedJwtToMapAdapter;
  7. import riomhaire.lti.infrastructure.Registry;
  8. import riomhaire.lti.model.interfaces.Action;
  9. import riomhaire.lti.model.interfaces.DecodeException;
  10. import java.util.HashMap;
  11. import java.util.Map;
  12. /**
  13. * This is the router for lti type messages - lti launch and create deep link .. this action will delegate to the
  14. * appropriate sub handler
  15. */
  16. @Slf4j
  17. @Builder
  18. public class ProcessLtiMessage implements Action<ModelAndView> {
  19. public static final String CLAIM_MESSAGE_TYPE = "https://purl.imsglobal.org/spec/lti/claim/message_type";
  20. public static final String LTI_RESOURCE_LINK_REQUEST = "LtiResourceLinkRequest";
  21. public static final String LTI_DEEP_LINKING_REQUEST = "LtiDeepLinkingRequest";
  22. Registry registry;
  23. Map<String, String> queryParams;
  24. Map<String, Object> metadata;
  25. @Override
  26. public ModelAndView execute() {
  27. var idToken = queryParams.get("id_token");
  28. var jwtToken = queryParams.get("JWT");
  29. // Crack open so we can find the config
  30. String token = (idToken != null) ? idToken : jwtToken;
  31. var jwt = JWT.decode(token);
  32. // Lookup client id and issuer
  33. var issuer = jwt.getClaim("iss").asString();
  34. var clientId = jwt.getClaim("aud").asString();
  35. var toolRegistration = registry.clientRegistrationResolver().lookupClient(issuer, clientId);
  36. var claims = new HashMap<>();
  37. if (toolRegistration.isPresent()) {
  38. // Validate JWT to verify its by who they say they are
  39. var clientConfiguration = toolRegistration.get();
  40. var adapter = JWKBasedJwtToMapAdapter.builder()
  41. .jwksUrl(clientConfiguration.getJwksUrl())
  42. .skipVerification(clientConfiguration.isSkipVerification())
  43. .build();
  44. try {
  45. claims.putAll(adapter.decode(token));
  46. } catch (DecodeException e) {
  47. // OK not valid
  48. claims.put("error", "cannot verify token because of: " + e.toString());
  49. }
  50. } else {
  51. claims.put("error", "cannot find client for " + issuer + " client-id " + clientId);
  52. }
  53. //
  54. // OK based off of the message delegate to the right sub-action
  55. var messageType = String.valueOf(claims.get(CLAIM_MESSAGE_TYPE));
  56. return switch (messageType) {
  57. case LTI_RESOURCE_LINK_REQUEST:
  58. //noinspection unchecked
  59. yield LaunchContent.builder()
  60. .registry(registry)
  61. .metadata(metadata)
  62. .queryParams(queryParams)
  63. .claims((Map) claims)
  64. .build()
  65. .execute();
  66. case LTI_DEEP_LINKING_REQUEST:
  67. //noinspection unchecked
  68. yield SelectDeepLinkContent.builder()
  69. .registry(registry)
  70. .metadata(metadata)
  71. .queryParams(queryParams)
  72. .claims((Map) claims)
  73. .build()
  74. .execute();
  75. default:
  76. throw new IllegalStateException("Unexpected value: " + messageType);
  77. };
  78. }
  79. }