@@ -23,26 +23,39 @@ local _M = {}
23
23
local http = require ' resty.http'
24
24
local cjose = require ' resty.cjose'
25
25
26
- function _M .process (dataStore , token , securityObj )
27
- local result = dataStore :getOAuthToken (' appId' , token )
28
- local httpc = http .new ()
29
- local json_resp
30
- if result ~= ngx .null then
31
- json_resp = cjson .decode (result )
32
- ngx .header [' X-OIDC-Email' ] = json_resp [' email' ]
33
- ngx .header [' X-OIDC-Sub' ] = json_resp [' sub' ]
34
- return json_resp
35
- end
36
- local keyUrl = utils .concatStrings ({APPID_PKURL , securityObj .tenantId , ' /publickeys' })
26
+ local function inject_req_headers (token_obj )
27
+ ngx .header [' X-OIDC-Email' ] = token_obj [' email' ]
28
+ ngx .header [' X-OIDC-Sub' ] = token_obj [' sub' ]
29
+ end
30
+
31
+ local function fetchJWKs (tenantId )
32
+ local keyUrl = utils .concatStrings ({APPID_PKURL , tenantId , ' /publickeys' })
37
33
local request_options = {
38
34
headers = {
39
35
[" Accept" ] = " application/json"
40
36
},
41
- ssl_verify = false
37
+ ssl_verify = true
42
38
}
43
- local res , err = httpc :request_uri (keyUrl , request_options )
44
- if err then
45
- request .err (500 , ' error getting app id key: ' .. err )
39
+ return httpc :request_uri (keyUrl , request_options )
40
+ end
41
+
42
+ function _M .process (dataStore , token , securityObj )
43
+ local cache_key = ' appid_' .. securityObj .tenantId
44
+ local result = dataStore :getOAuthToken (cache_key , token )
45
+ local httpc = http .new ()
46
+ local token_obj
47
+
48
+ -- Was the token in the cache?
49
+ if result ~= ngx .null then
50
+ token_obj = cjson .decode (result )
51
+ inject_req_headers (token_obj )
52
+ return token_obj
53
+ end
54
+
55
+ -- Cache miss. Proceed to validate the token
56
+ local res , err = fetchJWKs
57
+ if err or res .status ~= 200 then
58
+ request .err (500 , ' An error occurred while fetching the App ID JWK configuration: ' .. err or res .body )
46
59
end
47
60
48
61
local key
@@ -52,24 +65,26 @@ function _M.process(dataStore, token, securityObj)
52
65
end
53
66
local result = cjose .validateJWS (token , cjson .encode (key ))
54
67
if not result then
55
- request .err (401 , ' AppId key signature verification failed .' )
68
+ request .err (401 , ' The token signature did not match any known JWK .' )
56
69
return nil
57
70
end
58
- local jwt_obj = cjson .decode (cjose .getJWSInfo (token ))
59
- local expireTime = jwt_obj [' exp' ]
71
+
72
+ token_obj = cjson .decode (cjose .getJWSInfo (token ))
73
+ local expireTime = token_obj [' exp' ]
60
74
if expireTime < os.time () then
61
- request .err (401 , ' Access token expired.' )
75
+ request .err (401 , ' The access token has expired.' )
62
76
return nil
63
77
end
64
- ngx .header [' X-OIDC-Email' ] = jwt_obj [' email' ]
65
- ngx .header [' X-OIDC-Sub' ] = jwt_obj [' sub' ]
78
+
79
+ -- Add token metadata to the request headers
80
+ inject_req_headers (token_obj )
81
+
66
82
-- keep token in cache until it expires
67
83
local ttl = expireTime - os.time ()
68
- dataStore :saveOAuthToken (' appId ' , token , cjson .encode (jwt_obj ), ttl )
69
- return jwt_obj
84
+ dataStore :saveOAuthToken (cache_key , token , cjson .encode (token_obj ), ttl )
85
+ return token_obj
70
86
end
71
87
72
-
73
88
return _M
74
89
75
90
0 commit comments