forked from curityio/example-python-openid-connect-client
-
Notifications
You must be signed in to change notification settings - Fork 0
/
validator.py
77 lines (64 loc) · 2.65 KB
/
validator.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
##########################################################################
# Copyright 2016 Curity AB
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
##########################################################################
import json
import urllib2
from jwkest import BadSignature
from jwkest.jwk import KEYS
from jwkest.jws import JWS
from tools import base64_urldecode
from tools import get_ssl_context
class JwtValidatorException(Exception):
pass
class JwtValidator:
def __init__(self, config):
print 'Getting ssl context for jwks_uri'
self.ctx = get_ssl_context(config)
self.jwks_uri = config['jwks_uri']
self.jwks = self.load_keys()
def validate(self, jwt, iss, aud):
parts = jwt.split('.')
if len(parts) != 3:
raise BadSignature('Invalid JWT. Only JWS supported.')
header = json.loads(base64_urldecode(parts[0]))
payload = json.loads(base64_urldecode(parts[1]))
if iss != payload['iss']:
raise JwtValidatorException("Invalid issuer %s, expected %s" % (payload['iss'], iss))
if payload["aud"]:
if (isinstance(payload["aud"], str) and payload["aud"] != aud) or aud not in payload['aud']:
raise JwtValidatorException("Invalid audience %s, expected %s" % (payload['aud'], aud))
jws = JWS(alg=header['alg'])
# Raises exception when signature is invalid
try:
jws.verify_compact(jwt, self.jwks)
except Exception as e:
print "Exception validating signature"
raise JwtValidatorException(e)
print "Successfully validated signature."
def get_jwks_data(self):
request = urllib2.Request(self.jwks_uri)
request.add_header('Accept', 'application/json')
request.add_header('User-Agent', 'CurityExample/1.0')
try:
jwks_response = urllib2.urlopen(request, context=self.ctx)
except Exception as e:
print "Error fetching JWKS", e
raise e
return jwks_response.read()
def load_keys(self):
# load the jwk set.
jwks = KEYS()
jwks.load_jwks(self.get_jwks_data())
return jwks