/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.cxf.rs.security.oauth2.grants.jwt;
import javax.ws.rs.container.ContainerRequestContext;
import javax.ws.rs.container.ContainerRequestFilter;
import javax.ws.rs.core.Form;
import javax.ws.rs.core.MultivaluedMap;
import org.apache.cxf.jaxrs.provider.FormEncodingProvider;
import org.apache.cxf.jaxrs.utils.ExceptionUtils;
import org.apache.cxf.jaxrs.utils.FormUtils;
import org.apache.cxf.jaxrs.utils.HttpUtils;
import org.apache.cxf.jaxrs.utils.JAXRSUtils;
import org.apache.cxf.message.Message;
import org.apache.cxf.rs.security.jose.jaxrs.JwtTokenSecurityContext;
import org.apache.cxf.rs.security.jose.jwt.JwtConstants;
import org.apache.cxf.rs.security.jose.jwt.JwtToken;
import org.apache.cxf.rs.security.jose.jwt.JwtUtils;
import org.apache.cxf.rs.security.oauth2.common.Client;
import org.apache.cxf.rs.security.oauth2.provider.ClientRegistrationProvider;
import org.apache.cxf.rs.security.oauth2.provider.OAuthServerJoseJwtConsumer;
import org.apache.cxf.rs.security.oauth2.provider.OAuthServiceException;
import org.apache.cxf.rs.security.oauth2.utils.OAuthConstants;
import org.apache.cxf.security.SecurityContext;
public class JwtBearerAuthHandler extends OAuthServerJoseJwtConsumer implements ContainerRequestFilter {
private ClientRegistrationProvider clientProvider;
private FormEncodingProvider<Form> provider = new FormEncodingProvider<Form>(true);
private boolean validateAudience = true;
public JwtBearerAuthHandler() {
}
@Override
public void filter(ContainerRequestContext context) {
Message message = JAXRSUtils.getCurrentMessage();
Form form = readFormData(message);
MultivaluedMap<String, String> formData = form.asMap();
String assertionType = formData.getFirst(Constants.CLIENT_AUTH_ASSERTION_TYPE);
String decodedAssertionType = assertionType != null ? HttpUtils.urlDecode(assertionType) : null;
if (decodedAssertionType == null || !Constants.CLIENT_AUTH_JWT_BEARER.equals(decodedAssertionType)) {
throw ExceptionUtils.toNotAuthorizedException(null, null);
}
String assertion = formData.getFirst(Constants.CLIENT_AUTH_ASSERTION_PARAM);
if (assertion == null) {
throw ExceptionUtils.toNotAuthorizedException(null, null);
}
String clientId = formData.getFirst(OAuthConstants.CLIENT_ID);
Client client = null;
if (clientId != null && clientProvider != null) {
client = clientProvider.getClient(clientId);
if (client == null) {
throw ExceptionUtils.toNotAuthorizedException(null, null);
} else {
message.put(Client.class, client);
}
}
JwtToken token = super.getJwtToken(assertion, client);
String subjectName = (String)token.getClaim(JwtConstants.CLAIM_SUBJECT);
if (clientId != null && !clientId.equals(subjectName)) {
throw ExceptionUtils.toNotAuthorizedException(null, null);
}
message.put(OAuthConstants.CLIENT_ID, subjectName);
formData.remove(OAuthConstants.CLIENT_ID);
formData.remove(Constants.CLIENT_AUTH_ASSERTION_PARAM);
formData.remove(Constants.CLIENT_AUTH_ASSERTION_TYPE);
SecurityContext securityContext = configureSecurityContext(token);
if (securityContext != null) {
JAXRSUtils.getCurrentMessage().put(SecurityContext.class, securityContext);
}
// restore input stream
try {
FormUtils.restoreForm(provider, form, message);
} catch (Exception ex) {
throw ExceptionUtils.toNotAuthorizedException(null, null);
}
}
protected SecurityContext configureSecurityContext(JwtToken token) {
return new JwtTokenSecurityContext(token, null);
}
private Form readFormData(Message message) {
try {
return FormUtils.readForm(provider, message);
} catch (Exception ex) {
throw ExceptionUtils.toNotAuthorizedException(null, null);
}
}
@Override
protected void validateToken(JwtToken jwt) {
super.validateToken(jwt);
// We must have an issuer
if (jwt.getClaim(JwtConstants.CLAIM_ISSUER) == null) {
throw new OAuthServiceException(OAuthConstants.INVALID_GRANT);
}
// We must have a Subject
if (jwt.getClaim(JwtConstants.CLAIM_SUBJECT) == null) {
throw new OAuthServiceException(OAuthConstants.INVALID_GRANT);
}
// We must have an Expiry
if (jwt.getClaim(JwtConstants.CLAIM_EXPIRY) == null) {
throw new OAuthServiceException(OAuthConstants.INVALID_GRANT);
}
JwtUtils.validateTokenClaims(jwt.getClaims(), getTtl(), getClockOffset(), isValidateAudience());
}
public void setClientProvider(ClientRegistrationProvider clientProvider) {
this.clientProvider = clientProvider;
}
public boolean isValidateAudience() {
return validateAudience;
}
public void setValidateAudience(boolean validateAudience) {
this.validateAudience = validateAudience;
}
}