JWKBasedJwtToMapAdapter.java 1.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. package riomhaire.lti.adapters.token;
  2. import com.auth0.jwt.JWT;
  3. import com.auth0.jwt.interfaces.DecodedJWT;
  4. import lombok.Builder;
  5. import lombok.extern.slf4j.Slf4j;
  6. import org.jose4j.jwk.HttpsJwks;
  7. import org.jose4j.jwt.JwtClaims;
  8. import org.jose4j.jwt.consumer.InvalidJwtException;
  9. import org.jose4j.jwt.consumer.JwtConsumer;
  10. import org.jose4j.jwt.consumer.JwtConsumerBuilder;
  11. import org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolver;
  12. import riomhaire.lti.model.interfaces.DecodeException;
  13. import riomhaire.lti.model.interfaces.Decoder;
  14. import java.util.Map;
  15. @Slf4j
  16. @Builder
  17. public class JWKBasedJwtToMapAdapter implements Decoder<Map<String, Object>,String> {
  18. protected String jwksUrl;
  19. protected boolean skipVerification;
  20. public Map<String, Object> decode(String token) throws DecodeException {
  21. DecodedJWT jwt = JWT.decode(token);
  22. JwtClaims verifiedClaims;
  23. String clientId = jwt.getClaim("aud").asString();
  24. try {
  25. // OK look up jwks and verify
  26. log.info("Using key:"+jwt.getKeyId()+" to search: "+jwksUrl);
  27. HttpsJwks httpsJkws = new HttpsJwks(jwksUrl);
  28. HttpsJwksVerificationKeyResolver httpsJwksKeyResolver = new HttpsJwksVerificationKeyResolver(httpsJkws);
  29. JwtConsumer jwtConsumer = new JwtConsumerBuilder()
  30. .setVerificationKeyResolver(httpsJwksKeyResolver)
  31. .setExpectedAudience(clientId)
  32. .build();
  33. if( skipVerification ) { // Dont verify
  34. jwtConsumer.setSkipVerificationKeyResolutionOnNone(true);
  35. }
  36. verifiedClaims = jwtConsumer.processToClaims(token);
  37. } catch ( InvalidJwtException e) {
  38. throw new DecodeException();
  39. }
  40. // OK were here ... so valid
  41. return verifiedClaims.getClaimsMap();
  42. }
  43. }