|
|
|
@ -2,6 +2,7 @@
@@ -2,6 +2,7 @@
|
|
|
|
|
package de.srsoftware.oidc.backend; |
|
|
|
|
|
|
|
|
|
import static de.srsoftware.oidc.api.Constants.*; |
|
|
|
|
import static de.srsoftware.utils.Optionals.optional; |
|
|
|
|
import static java.lang.System.Logger.Level.*; |
|
|
|
|
import static java.net.HttpURLConnection.HTTP_BAD_REQUEST; |
|
|
|
|
|
|
|
|
@ -15,7 +16,6 @@ import java.util.stream.Collectors;
@@ -15,7 +16,6 @@ import java.util.stream.Collectors;
|
|
|
|
|
import org.jose4j.jwk.PublicJsonWebKey; |
|
|
|
|
import org.jose4j.jws.JsonWebSignature; |
|
|
|
|
import org.jose4j.jwt.JwtClaims; |
|
|
|
|
import org.jose4j.jwt.MalformedClaimException; |
|
|
|
|
import org.jose4j.lang.JoseException; |
|
|
|
|
import org.json.JSONObject; |
|
|
|
|
|
|
|
|
@ -70,13 +70,27 @@ public class TokenController extends PathHandler {
@@ -70,13 +70,27 @@ public class TokenController extends PathHandler {
|
|
|
|
|
var uri = URLDecoder.decode(map.get(REDIRECT_URI), StandardCharsets.UTF_8); |
|
|
|
|
if (!client.redirectUris().contains(uri)) sendContent(ex, HTTP_BAD_REQUEST, Map.of(ERROR, "unknown redirect uri", REDIRECT_URI, uri)); |
|
|
|
|
|
|
|
|
|
var secretFromClient = URLDecoder.decode(map.get(CLIENT_SECRET)); |
|
|
|
|
if (secretFromClient != null && !client.secret().equals(secretFromClient)) return sendContent(ex, HTTP_BAD_REQUEST, Map.of(ERROR, "client secret mismatch")); |
|
|
|
|
|
|
|
|
|
if (client.secret() != null) { |
|
|
|
|
String clientSecret = optional(ex.getRequestHeaders().get(AUTHORIZATION)) |
|
|
|
|
.map(list -> list.get(0)) |
|
|
|
|
.filter(s -> s.startsWith("Basic ")) |
|
|
|
|
.map(s -> s.substring(6)) |
|
|
|
|
.map(s -> Base64.getDecoder().decode(s)) |
|
|
|
|
.map(bytes -> new String(bytes, StandardCharsets.UTF_8)) |
|
|
|
|
.filter(s -> s.startsWith("%s:".formatted(client.id()))) |
|
|
|
|
.map(s -> s.substring(client.id().length() + 1).trim()) |
|
|
|
|
.map(s -> { |
|
|
|
|
System.err.println(s); |
|
|
|
|
return s; |
|
|
|
|
}) |
|
|
|
|
.orElseGet(() -> map.get(CLIENT_SECRET)); |
|
|
|
|
if (clientSecret == null) return sendContent(ex, HTTP_BAD_REQUEST, Map.of(ERROR, "client secret missing")); |
|
|
|
|
if (!client.secret().equals(clientSecret)) return sendContent(ex, HTTP_BAD_REQUEST, Map.of(ERROR, "client secret mismatch")); |
|
|
|
|
} |
|
|
|
|
String jwToken = createJWT(client, user.get()); |
|
|
|
|
ex.getResponseHeaders().add("Cache-Control", "no-store"); |
|
|
|
|
JSONObject response = new JSONObject(); |
|
|
|
|
response.put(ACCESS_TOKEN, UUID.randomUUID().toString()); // TODO: wofür genau wird der verwendet, was gilt es hier zu beachten
|
|
|
|
|
response.put(ACCESS_TOKEN, users.accessToken(user.get())); |
|
|
|
|
response.put(TOKEN_TYPE, BEARER); |
|
|
|
|
response.put(EXPIRES_IN, 3600); |
|
|
|
|
response.put(ID_TOKEN, jwToken); |
|
|
|
@ -87,7 +101,7 @@ public class TokenController extends PathHandler {
@@ -87,7 +101,7 @@ public class TokenController extends PathHandler {
|
|
|
|
|
private String createJWT(Client client, User user) { |
|
|
|
|
try { |
|
|
|
|
PublicJsonWebKey key = keyManager.getKey(); |
|
|
|
|
|
|
|
|
|
key.setUse("sig"); |
|
|
|
|
JwtClaims claims = getJwtClaims(user, client); |
|
|
|
|
|
|
|
|
|
// A JWT is a JWS and/or a JWE with JSON claims as the payload.
|
|
|
|
@ -99,6 +113,7 @@ public class TokenController extends PathHandler {
@@ -99,6 +113,7 @@ public class TokenController extends PathHandler {
|
|
|
|
|
jws.setKey(key.getPrivateKey()); |
|
|
|
|
jws.setKeyIdHeaderValue(key.getKeyId()); |
|
|
|
|
jws.setAlgorithmHeaderValue(key.getAlgorithm()); |
|
|
|
|
|
|
|
|
|
return jws.getCompactSerialization(); |
|
|
|
|
} catch (JoseException | KeyManager.KeyCreationException | IOException e) { |
|
|
|
|
throw new RuntimeException(e); |
|
|
|
@ -115,17 +130,7 @@ public class TokenController extends PathHandler {
@@ -115,17 +130,7 @@ public class TokenController extends PathHandler {
|
|
|
|
|
claims.setIssuer("https://lightoidc.srsoftware.de"); // who creates the token and signs it
|
|
|
|
|
claims.setGeneratedJwtId(); // a unique identifier for the token
|
|
|
|
|
claims.setSubject(user.uuid()); // the subject/principal is whom the token is about
|
|
|
|
|
|
|
|
|
|
// die nachfolgenden Claims sind nur Spielerei, ich habe versucht, das System mit Umbrella zum Laufen zu bekommen
|
|
|
|
|
claims.setClaim("scope", "openid"); |
|
|
|
|
claims.setStringListClaim("amr", "pwd"); |
|
|
|
|
claims.setClaim("at_hash", Base64.getEncoder().encodeToString("Test".getBytes(StandardCharsets.UTF_8))); |
|
|
|
|
claims.setClaim("azp", client.id()); |
|
|
|
|
claims.setClaim("email_verified", true); |
|
|
|
|
try { |
|
|
|
|
claims.setClaim("rat", claims.getIssuedAt().getValue()); |
|
|
|
|
} catch (MalformedClaimException e) { |
|
|
|
|
} |
|
|
|
|
client.nonce().ifPresent(nonce -> claims.setClaim(NONCE, nonce)); |
|
|
|
|
return claims; |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|