![JAR search and dependency download from the Maven repository](/logo.png)
org.cloudfoundry.identity.uaa.oauth.TokenKeyEndpoint Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of cloudfoundry-identity-server Show documentation
Show all versions of cloudfoundry-identity-server Show documentation
Cloud Foundry User Account and Authentication
The newest version!
/*******************************************************************************
* Cloud Foundry
* Copyright (c) [2009-2016] Pivotal Software, Inc. All Rights Reserved.
*
* This product is licensed to you under the Apache License, Version 2.0 (the "License").
* You may not use this product except in compliance with the License.
*
* This product includes a number of subcomponents with
* separate copyright notices and license terms. Your use of these
* subcomponents is subject to the terms and conditions of the
* subcomponent's license, as noted in the LICENSE file.
*******************************************************************************/
package org.cloudfoundry.identity.uaa.oauth;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.cloudfoundry.identity.uaa.oauth.token.VerificationKeyResponse;
import org.cloudfoundry.identity.uaa.oauth.token.VerificationKeysListResponse;
import org.cloudfoundry.identity.uaa.zone.IdentityZoneHolder;
import org.springframework.http.HttpHeaders;
import org.springframework.http.HttpStatus;
import org.springframework.http.ResponseEntity;
import org.springframework.security.access.AccessDeniedException;
import org.springframework.security.authentication.AnonymousAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.GrantedAuthority;
import org.springframework.stereotype.Controller;
import org.springframework.web.bind.annotation.RequestHeader;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestMethod;
import org.springframework.web.bind.annotation.ResponseBody;
import java.security.Principal;
import java.util.Collections;
import java.util.List;
import java.util.Map;
import java.util.stream.Collectors;
import static org.cloudfoundry.identity.uaa.oauth.jwk.JsonWebKey.KeyType.RSA;
/**
* OAuth2 token services that produces JWT encoded token values.
*
*/
@Controller
public class TokenKeyEndpoint {
protected final Log logger = LogFactory.getLog(getClass());
private KeyInfoService keyInfoService;
public TokenKeyEndpoint(KeyInfoService keyInfoService) {
this.keyInfoService = keyInfoService;
}
@RequestMapping(value = "/token_key", method = RequestMethod.GET)
@ResponseBody
public ResponseEntity getKey(Principal principal,
@RequestHeader(value = "If-None-Match", required = false, defaultValue = "NaN") String eTag) {
String lastModified = ((Long) IdentityZoneHolder.get().getLastModified().getTime()).toString();
if (unmodifiedResource(eTag, lastModified)) {
return new ResponseEntity<>(HttpStatus.NOT_MODIFIED);
}
HttpHeaders header = new HttpHeaders();
header.put("ETag", Collections.singletonList(lastModified));
return new ResponseEntity<>(getKey(principal), header, HttpStatus.OK);
}
@RequestMapping(value = "/token_keys", method = RequestMethod.GET)
@ResponseBody
public ResponseEntity getKeys(Principal principal,
@RequestHeader(value = "If-None-Match", required = false, defaultValue = "NaN") String eTag) {
String lastModified = ((Long) IdentityZoneHolder.get().getLastModified().getTime()).toString();
if (unmodifiedResource(eTag, lastModified)) {
return new ResponseEntity<>(HttpStatus.NOT_MODIFIED);
}
HttpHeaders header = new HttpHeaders();
header.put("ETag", Collections.singletonList(lastModified));
return new ResponseEntity<>(getKeys(principal), header, HttpStatus.OK);
}
/**
* Get the verification key for the token signatures. The principal has to
* be provided only if the key is secret
* (shared not public).
*
* @param principal the currently authenticated user if there is one
* @return the key used to verify tokens
*/
public VerificationKeyResponse getKey(Principal principal) {
KeyInfo key = keyInfoService.getActiveKey();
if (!includeSymmetricalKeys(principal) && !RSA.name().equals(key.type())) {
throw new AccessDeniedException("You need to authenticate to see a shared key");
}
return getVerificationKeyResponse(key);
}
public static VerificationKeyResponse getVerificationKeyResponse(KeyInfo key) {
return new VerificationKeyResponse(getResultMap(key));
}
public static Map getResultMap(KeyInfo key) {
return key.getJwkMap();
}
private boolean unmodifiedResource(String eTag, String lastModified) {
return !eTag.equals("NaN") && lastModified.equals(eTag);
}
/**
* Get the verification key for the token signatures wrapped into keys array.
* Wrapping done for compatibility with some clients expecting this even for single key, like mod_auth_openidc.
* The principal has to be provided only if the key is secret
* (shared not public).
*
* @param principal the currently authenticated user if there is one
* @return the key used to verify tokens, wrapped in keys array
*/
public VerificationKeysListResponse getKeys(Principal principal) {
boolean includeSymmetric = includeSymmetricalKeys(principal);
Map keys = keyInfoService.getKeys();
List keyResponses = keys.values().stream()
.filter(k -> includeSymmetric || RSA.name().equals(k.type()))
.map(TokenKeyEndpoint::getVerificationKeyResponse)
.collect(Collectors.toList());
return new VerificationKeysListResponse(keyResponses);
}
protected boolean includeSymmetricalKeys(Principal principal) {
if (principal!=null) {
if (principal instanceof AnonymousAuthenticationToken) {
return false;
} else if (principal instanceof Authentication) {
Authentication auth = (Authentication)principal;
if (auth.getAuthorities()!=null) {
for (GrantedAuthority authority : auth.getAuthorities()) {
if ("uaa.resource".equals(authority.getAuthority())) {
return true;
}
}
}
}
}
return false;
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy