Consolidate shared code between JwtDecoders and ReactiveJwtDecoders
Extract duplicated code from JwtDecoders and ReactiveJwtDecoders into a package-private class. Fixes gh-7263
This commit is contained in:
parent
742c971889
commit
505882c944
|
@ -0,0 +1,101 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2002-2019 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.springframework.security.oauth2.jwt;
|
||||||
|
|
||||||
|
import org.springframework.core.ParameterizedTypeReference;
|
||||||
|
import org.springframework.http.RequestEntity;
|
||||||
|
import org.springframework.http.ResponseEntity;
|
||||||
|
import org.springframework.web.client.HttpClientErrorException;
|
||||||
|
import org.springframework.web.client.RestTemplate;
|
||||||
|
import org.springframework.web.util.UriComponentsBuilder;
|
||||||
|
|
||||||
|
import java.net.URI;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.Map;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Allows resolving configuration from an
|
||||||
|
* <a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig">OpenID Provider Configuration</a> or
|
||||||
|
* <a href="https://tools.ietf.org/html/rfc8414#section-3.1">Authorization Server Metadata Request</a> based on provided
|
||||||
|
* issuer and method invoked.
|
||||||
|
*
|
||||||
|
* @author Thomas Vitale
|
||||||
|
* @since 5.2
|
||||||
|
*/
|
||||||
|
class JwtDecoderProviderConfigurationUtils {
|
||||||
|
private static final String OIDC_METADATA_PATH = "/.well-known/openid-configuration";
|
||||||
|
private static final String OAUTH_METADATA_PATH = "/.well-known/oauth-authorization-server";
|
||||||
|
private static final RestTemplate rest = new RestTemplate();
|
||||||
|
private static final ParameterizedTypeReference<Map<String, Object>> typeReference =
|
||||||
|
new ParameterizedTypeReference<Map<String, Object>>() {};
|
||||||
|
|
||||||
|
static Map<String, Object> getConfigurationForOidcIssuerLocation(String oidcIssuerLocation) {
|
||||||
|
return getConfiguration(oidcIssuerLocation, oidc(URI.create(oidcIssuerLocation)));
|
||||||
|
}
|
||||||
|
|
||||||
|
static Map<String, Object> getConfigurationForIssuerLocation(String issuer) {
|
||||||
|
URI uri = URI.create(issuer);
|
||||||
|
return getConfiguration(issuer, oidc(uri), oidcRfc8414(uri), oauth(uri));
|
||||||
|
}
|
||||||
|
|
||||||
|
static void validateIssuer(Map<String, Object> configuration, String issuer) {
|
||||||
|
String metadataIssuer = "(unavailable)";
|
||||||
|
if (configuration.containsKey("issuer")) {
|
||||||
|
metadataIssuer = configuration.get("issuer").toString();
|
||||||
|
}
|
||||||
|
if (!issuer.equals(metadataIssuer)) {
|
||||||
|
throw new IllegalStateException("The Issuer \"" + metadataIssuer + "\" provided in the configuration did not "
|
||||||
|
+ "match the requested issuer \"" + issuer + "\"");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private static Map<String, Object> getConfiguration(String issuer, URI... uris) {
|
||||||
|
String errorMessage = "Unable to resolve the Configuration with the provided Issuer of " +
|
||||||
|
"\"" + issuer + "\"";
|
||||||
|
for (URI uri : uris) {
|
||||||
|
try {
|
||||||
|
RequestEntity<Void> request = RequestEntity.get(uri).build();
|
||||||
|
ResponseEntity<Map<String, Object>> response = rest.exchange(request, typeReference);
|
||||||
|
return response.getBody();
|
||||||
|
} catch (RuntimeException e) {
|
||||||
|
if (!(e instanceof HttpClientErrorException &&
|
||||||
|
((HttpClientErrorException) e).getStatusCode().is4xxClientError())) {
|
||||||
|
throw new IllegalArgumentException(errorMessage, e);
|
||||||
|
}
|
||||||
|
// else try another endpoint
|
||||||
|
}
|
||||||
|
}
|
||||||
|
throw new IllegalArgumentException(errorMessage);
|
||||||
|
}
|
||||||
|
|
||||||
|
private static URI oidc(URI issuer) {
|
||||||
|
return UriComponentsBuilder.fromUri(issuer)
|
||||||
|
.replacePath(issuer.getPath() + OIDC_METADATA_PATH)
|
||||||
|
.build(Collections.emptyMap());
|
||||||
|
}
|
||||||
|
|
||||||
|
private static URI oidcRfc8414(URI issuer) {
|
||||||
|
return UriComponentsBuilder.fromUri(issuer)
|
||||||
|
.replacePath(OIDC_METADATA_PATH + issuer.getPath())
|
||||||
|
.build(Collections.emptyMap());
|
||||||
|
}
|
||||||
|
|
||||||
|
private static URI oauth(URI issuer) {
|
||||||
|
return UriComponentsBuilder.fromUri(issuer)
|
||||||
|
.replacePath(OAUTH_METADATA_PATH + issuer.getPath())
|
||||||
|
.build(Collections.emptyMap());
|
||||||
|
}
|
||||||
|
}
|
|
@ -15,18 +15,10 @@
|
||||||
*/
|
*/
|
||||||
package org.springframework.security.oauth2.jwt;
|
package org.springframework.security.oauth2.jwt;
|
||||||
|
|
||||||
import java.net.URI;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
import org.springframework.core.ParameterizedTypeReference;
|
|
||||||
import org.springframework.http.RequestEntity;
|
|
||||||
import org.springframework.http.ResponseEntity;
|
|
||||||
import org.springframework.security.oauth2.core.OAuth2TokenValidator;
|
import org.springframework.security.oauth2.core.OAuth2TokenValidator;
|
||||||
import org.springframework.util.Assert;
|
import org.springframework.util.Assert;
|
||||||
import org.springframework.web.client.HttpClientErrorException;
|
|
||||||
import org.springframework.web.client.RestTemplate;
|
|
||||||
import org.springframework.web.util.UriComponentsBuilder;
|
|
||||||
|
|
||||||
import static org.springframework.security.oauth2.jwt.NimbusJwtDecoder.withJwkSetUri;
|
import static org.springframework.security.oauth2.jwt.NimbusJwtDecoder.withJwkSetUri;
|
||||||
|
|
||||||
|
@ -41,11 +33,6 @@ import static org.springframework.security.oauth2.jwt.NimbusJwtDecoder.withJwkSe
|
||||||
* @since 5.1
|
* @since 5.1
|
||||||
*/
|
*/
|
||||||
public final class JwtDecoders {
|
public final class JwtDecoders {
|
||||||
private static final String OIDC_METADATA_PATH = "/.well-known/openid-configuration";
|
|
||||||
private static final String OAUTH_METADATA_PATH = "/.well-known/oauth-authorization-server";
|
|
||||||
private static final RestTemplate rest = new RestTemplate();
|
|
||||||
private static final ParameterizedTypeReference<Map<String, Object>> typeReference =
|
|
||||||
new ParameterizedTypeReference<Map<String, Object>>() {};
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a {@link JwtDecoder} using the provided
|
* Creates a {@link JwtDecoder} using the provided
|
||||||
|
@ -60,7 +47,7 @@ public final class JwtDecoders {
|
||||||
*/
|
*/
|
||||||
public static JwtDecoder fromOidcIssuerLocation(String oidcIssuerLocation) {
|
public static JwtDecoder fromOidcIssuerLocation(String oidcIssuerLocation) {
|
||||||
Assert.hasText(oidcIssuerLocation, "oidcIssuerLocation cannot be empty");
|
Assert.hasText(oidcIssuerLocation, "oidcIssuerLocation cannot be empty");
|
||||||
Map<String, Object> configuration = getConfiguration(oidcIssuerLocation, oidc(URI.create(oidcIssuerLocation)));
|
Map<String, Object> configuration = JwtDecoderProviderConfigurationUtils.getConfigurationForOidcIssuerLocation(oidcIssuerLocation);
|
||||||
return withProviderConfiguration(configuration, oidcIssuerLocation);
|
return withProviderConfiguration(configuration, oidcIssuerLocation);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -93,70 +80,27 @@ public final class JwtDecoders {
|
||||||
* Note that the second endpoint is the equivalent of calling
|
* Note that the second endpoint is the equivalent of calling
|
||||||
* {@link JwtDecoders#fromOidcIssuerLocation(String)}
|
* {@link JwtDecoders#fromOidcIssuerLocation(String)}
|
||||||
*
|
*
|
||||||
* @param issuer
|
* @param issuer the <a href="https://openid.net/specs/openid-connect-core-1_0.html#IssuerIdentifier">Issuer</a>
|
||||||
* @return a {@link JwtDecoder} that was initialized by one of the described endpoints
|
* @return a {@link JwtDecoder} that was initialized by one of the described endpoints
|
||||||
*/
|
*/
|
||||||
public static JwtDecoder fromIssuerLocation(String issuer) {
|
public static JwtDecoder fromIssuerLocation(String issuer) {
|
||||||
Assert.hasText(issuer, "issuer cannot be empty");
|
Assert.hasText(issuer, "issuer cannot be empty");
|
||||||
URI uri = URI.create(issuer);
|
Map<String, Object> configuration = JwtDecoderProviderConfigurationUtils.getConfigurationForIssuerLocation(issuer);
|
||||||
Map<String, Object> configuration = getConfiguration(issuer, oidc(uri), oidcRfc8414(uri), oauth(uri));
|
|
||||||
return withProviderConfiguration(configuration, issuer);
|
return withProviderConfiguration(configuration, issuer);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static URI oidc(URI issuer) {
|
|
||||||
return UriComponentsBuilder.fromUri(issuer)
|
|
||||||
.replacePath(issuer.getPath() + OIDC_METADATA_PATH).build(Collections.emptyMap());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static URI oidcRfc8414(URI issuer) {
|
|
||||||
return UriComponentsBuilder.fromUri(issuer)
|
|
||||||
.replacePath(OIDC_METADATA_PATH + issuer.getPath()).build(Collections.emptyMap());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static URI oauth(URI issuer) {
|
|
||||||
return UriComponentsBuilder.fromUri(issuer)
|
|
||||||
.replacePath(OAUTH_METADATA_PATH + issuer.getPath()).build(Collections.emptyMap());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Map<String, Object> getConfiguration(String issuer, URI... uris) {
|
|
||||||
String errorMessage = "Unable to resolve the Configuration with the provided Issuer of " +
|
|
||||||
"\"" + issuer + "\"";
|
|
||||||
for (URI uri : uris) {
|
|
||||||
try {
|
|
||||||
RequestEntity<Void> request = RequestEntity.get(uri).build();
|
|
||||||
ResponseEntity<Map<String, Object>> response = rest.exchange(request, typeReference);
|
|
||||||
return response.getBody();
|
|
||||||
} catch (RuntimeException e) {
|
|
||||||
if (!(e instanceof HttpClientErrorException &&
|
|
||||||
((HttpClientErrorException) e).getStatusCode().is4xxClientError())) {
|
|
||||||
throw new IllegalArgumentException(errorMessage, e);
|
|
||||||
}
|
|
||||||
// else try another endpoint
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw new IllegalArgumentException(errorMessage);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Validate provided issuer and build {@link JwtDecoder} from
|
* Validate provided issuer and build {@link JwtDecoder} from
|
||||||
* <a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse">OpenID Provider
|
* <a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse">OpenID Provider
|
||||||
* Configuration Response</a> and <a href="https://tools.ietf.org/html/rfc8414#section-3.2">Authorization Server Metadata
|
* Configuration Response</a> and <a href="https://tools.ietf.org/html/rfc8414#section-3.2">Authorization Server Metadata
|
||||||
* Response</a>.
|
* Response</a>.
|
||||||
*
|
*
|
||||||
* @param configuration
|
* @param configuration the configuration values
|
||||||
* @param issuer
|
* @param issuer the <a href="https://openid.net/specs/openid-connect-core-1_0.html#IssuerIdentifier">Issuer</a>
|
||||||
* @return {@link JwtDecoder}
|
* @return {@link JwtDecoder}
|
||||||
*/
|
*/
|
||||||
private static JwtDecoder withProviderConfiguration(Map<String, Object> configuration, String issuer) {
|
private static JwtDecoder withProviderConfiguration(Map<String, Object> configuration, String issuer) {
|
||||||
String metadataIssuer = "(unavailable)";
|
JwtDecoderProviderConfigurationUtils.validateIssuer(configuration, issuer);
|
||||||
if (configuration.containsKey("issuer")) {
|
|
||||||
metadataIssuer = configuration.get("issuer").toString();
|
|
||||||
}
|
|
||||||
if (!issuer.equals(metadataIssuer)) {
|
|
||||||
throw new IllegalStateException("The Issuer \"" + metadataIssuer + "\" provided in the configuration did not "
|
|
||||||
+ "match the requested issuer \"" + issuer + "\"");
|
|
||||||
}
|
|
||||||
|
|
||||||
OAuth2TokenValidator<Jwt> jwtValidator = JwtValidators.createDefaultWithIssuer(issuer);
|
OAuth2TokenValidator<Jwt> jwtValidator = JwtValidators.createDefaultWithIssuer(issuer);
|
||||||
NimbusJwtDecoder jwtDecoder = withJwkSetUri(configuration.get("jwks_uri").toString()).build();
|
NimbusJwtDecoder jwtDecoder = withJwkSetUri(configuration.get("jwks_uri").toString()).build();
|
||||||
jwtDecoder.setJwtValidator(jwtValidator);
|
jwtDecoder.setJwtValidator(jwtValidator);
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* Copyright 2002-2018 the original author or authors.
|
* Copyright 2002-2019 the original author or authors.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
|
@ -15,34 +15,23 @@
|
||||||
*/
|
*/
|
||||||
package org.springframework.security.oauth2.jwt;
|
package org.springframework.security.oauth2.jwt;
|
||||||
|
|
||||||
import java.net.URI;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
import org.springframework.core.ParameterizedTypeReference;
|
|
||||||
import org.springframework.http.RequestEntity;
|
|
||||||
import org.springframework.http.ResponseEntity;
|
|
||||||
import org.springframework.security.oauth2.core.OAuth2TokenValidator;
|
import org.springframework.security.oauth2.core.OAuth2TokenValidator;
|
||||||
import org.springframework.util.Assert;
|
import org.springframework.util.Assert;
|
||||||
import org.springframework.web.client.HttpClientErrorException;
|
|
||||||
import org.springframework.web.client.RestTemplate;
|
|
||||||
import org.springframework.web.util.UriComponentsBuilder;
|
|
||||||
|
|
||||||
import static org.springframework.security.oauth2.jwt.NimbusReactiveJwtDecoder.withJwkSetUri;
|
import static org.springframework.security.oauth2.jwt.NimbusReactiveJwtDecoder.withJwkSetUri;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Allows creating a {@link ReactiveJwtDecoder} from an
|
* Allows creating a {@link ReactiveJwtDecoder} from an
|
||||||
* <a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig">OpenID Provider Configuration</a>.
|
* <a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig">OpenID Provider Configuration</a> or
|
||||||
|
* <a href="https://tools.ietf.org/html/rfc8414#section-3.1">Authorization Server Metadata Request</a> based on provided
|
||||||
|
* issuer and method invoked.
|
||||||
*
|
*
|
||||||
* @author Josh Cummings
|
* @author Josh Cummings
|
||||||
* @since 5.1
|
* @since 5.1
|
||||||
*/
|
*/
|
||||||
public final class ReactiveJwtDecoders {
|
public final class ReactiveJwtDecoders {
|
||||||
private static final String OIDC_METADATA_PATH = "/.well-known/openid-configuration";
|
|
||||||
private static final String OAUTH_METADATA_PATH = "/.well-known/oauth-authorization-server";
|
|
||||||
private static final RestTemplate rest = new RestTemplate();
|
|
||||||
private static final ParameterizedTypeReference<Map<String, Object>> typeReference =
|
|
||||||
new ParameterizedTypeReference<Map<String, Object>>() {};
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a {@link ReactiveJwtDecoder} using the provided
|
* Creates a {@link ReactiveJwtDecoder} using the provided
|
||||||
|
@ -57,7 +46,7 @@ public final class ReactiveJwtDecoders {
|
||||||
*/
|
*/
|
||||||
public static ReactiveJwtDecoder fromOidcIssuerLocation(String oidcIssuerLocation) {
|
public static ReactiveJwtDecoder fromOidcIssuerLocation(String oidcIssuerLocation) {
|
||||||
Assert.hasText(oidcIssuerLocation, "oidcIssuerLocation cannot be empty");
|
Assert.hasText(oidcIssuerLocation, "oidcIssuerLocation cannot be empty");
|
||||||
Map<String, Object> configuration = getConfiguration(oidcIssuerLocation, oidc(URI.create(oidcIssuerLocation)));
|
Map<String, Object> configuration = JwtDecoderProviderConfigurationUtils.getConfigurationForOidcIssuerLocation(oidcIssuerLocation);
|
||||||
return withProviderConfiguration(configuration, oidcIssuerLocation);
|
return withProviderConfiguration(configuration, oidcIssuerLocation);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -90,60 +79,27 @@ public final class ReactiveJwtDecoders {
|
||||||
* Note that the second endpoint is the equivalent of calling
|
* Note that the second endpoint is the equivalent of calling
|
||||||
* {@link ReactiveJwtDecoders#fromOidcIssuerLocation(String)}
|
* {@link ReactiveJwtDecoders#fromOidcIssuerLocation(String)}
|
||||||
*
|
*
|
||||||
* @param issuer
|
* @param issuer the <a href="https://openid.net/specs/openid-connect-core-1_0.html#IssuerIdentifier">Issuer</a>
|
||||||
* @return a {@link ReactiveJwtDecoder} that was initialized by one of the described endpoints
|
* @return a {@link ReactiveJwtDecoder} that was initialized by one of the described endpoints
|
||||||
*/
|
*/
|
||||||
public static ReactiveJwtDecoder fromIssuerLocation(String issuer) {
|
public static ReactiveJwtDecoder fromIssuerLocation(String issuer) {
|
||||||
Assert.hasText(issuer, "issuer cannot be empty");
|
Assert.hasText(issuer, "issuer cannot be empty");
|
||||||
URI uri = URI.create(issuer);
|
Map<String, Object> configuration = JwtDecoderProviderConfigurationUtils.getConfigurationForIssuerLocation(issuer);
|
||||||
Map<String, Object> configuration = getConfiguration(issuer, oidc(uri), oidcRfc8414(uri), oauth(uri));
|
|
||||||
return withProviderConfiguration(configuration, issuer);
|
return withProviderConfiguration(configuration, issuer);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static URI oidc(URI issuer) {
|
/**
|
||||||
return UriComponentsBuilder.fromUri(issuer)
|
* Build {@link ReactiveJwtDecoder} from
|
||||||
.replacePath(issuer.getPath() + OIDC_METADATA_PATH).build(Collections.emptyMap());
|
* <a href="https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse">OpenID Provider
|
||||||
}
|
* Configuration Response</a> and <a href="https://tools.ietf.org/html/rfc8414#section-3.2">Authorization Server Metadata
|
||||||
|
* Response</a>.
|
||||||
private static URI oidcRfc8414(URI issuer) {
|
*
|
||||||
return UriComponentsBuilder.fromUri(issuer)
|
* @param configuration the configuration values
|
||||||
.replacePath(OIDC_METADATA_PATH + issuer.getPath()).build(Collections.emptyMap());
|
* @param issuer the <a href="https://openid.net/specs/openid-connect-core-1_0.html#IssuerIdentifier">Issuer</a>
|
||||||
}
|
* @return {@link ReactiveJwtDecoder}
|
||||||
|
*/
|
||||||
private static URI oauth(URI issuer) {
|
|
||||||
return UriComponentsBuilder.fromUri(issuer)
|
|
||||||
.replacePath(OAUTH_METADATA_PATH + issuer.getPath()).build(Collections.emptyMap());
|
|
||||||
}
|
|
||||||
|
|
||||||
private static Map<String, Object> getConfiguration(String issuer, URI... uris) {
|
|
||||||
String errorMessage = "Unable to resolve the Configuration with the provided Issuer of " +
|
|
||||||
"\"" + issuer + "\"";
|
|
||||||
for (URI uri : uris) {
|
|
||||||
try {
|
|
||||||
RequestEntity<Void> request = RequestEntity.get(uri).build();
|
|
||||||
ResponseEntity<Map<String, Object>> response = rest.exchange(request, typeReference);
|
|
||||||
return response.getBody();
|
|
||||||
} catch (RuntimeException e) {
|
|
||||||
if (!(e instanceof HttpClientErrorException &&
|
|
||||||
((HttpClientErrorException) e).getStatusCode().is4xxClientError())) {
|
|
||||||
throw new IllegalArgumentException(errorMessage, e);
|
|
||||||
}
|
|
||||||
// else try another endpoint
|
|
||||||
}
|
|
||||||
}
|
|
||||||
throw new IllegalArgumentException(errorMessage);
|
|
||||||
}
|
|
||||||
|
|
||||||
private static ReactiveJwtDecoder withProviderConfiguration(Map<String, Object> configuration, String issuer) {
|
private static ReactiveJwtDecoder withProviderConfiguration(Map<String, Object> configuration, String issuer) {
|
||||||
String metadataIssuer = "(unavailable)";
|
JwtDecoderProviderConfigurationUtils.validateIssuer(configuration, issuer);
|
||||||
if (configuration.containsKey("issuer")) {
|
|
||||||
metadataIssuer = configuration.get("issuer").toString();
|
|
||||||
}
|
|
||||||
if (!issuer.equals(metadataIssuer)) {
|
|
||||||
throw new IllegalStateException("The Issuer \"" + metadataIssuer + "\" provided in the configuration did not "
|
|
||||||
+ "match the requested issuer \"" + issuer + "\"");
|
|
||||||
}
|
|
||||||
|
|
||||||
OAuth2TokenValidator<Jwt> jwtValidator = JwtValidators.createDefaultWithIssuer(issuer);
|
OAuth2TokenValidator<Jwt> jwtValidator = JwtValidators.createDefaultWithIssuer(issuer);
|
||||||
NimbusReactiveJwtDecoder jwtDecoder = withJwkSetUri(configuration.get("jwks_uri").toString()).build();
|
NimbusReactiveJwtDecoder jwtDecoder = withJwkSetUri(configuration.get("jwks_uri").toString()).build();
|
||||||
jwtDecoder.setJwtValidator(jwtValidator);
|
jwtDecoder.setJwtValidator(jwtValidator);
|
||||||
|
|
Loading…
Reference in New Issue