issuerBuilder = $issuerBuilder ?? new IssuerBuilder(); $this->algorithmManager = $algorithmManager ?? (new AlgorithmManagerBuilder())->build(); $this->JWSVerifier = $JWSVerifier ?? new JWSVerifier($this->algorithmManager); $this->serializer = $serializer ?? new CompactSerializer(); } /** * @psalm-param array $data * * @psalm-return bool * * @psalm-assert-if-true ClaimSourceAggregateType $data */ protected function isAggregateSource(array $data): bool { return array_key_exists('JWT', $data); } /** * @psalm-param array $data * * @psalm-return bool * * @psalm-assert-if-true ClaimSourceDistributedType $data */ protected function isDistributedSource(array $data): bool { return array_key_exists('endpoint', $data); } /** * @return array */ protected function claimJWT(OpenIDClient $client, string $jwt): array { $issuer = $client->getIssuer(); try { /** @var null|array $header */ $header = json_decode(base64url_decode(explode('.', $jwt)[0] ?? '{}'), true, 512, JSON_THROW_ON_ERROR); /** @var array $payload */ $payload = json_decode(base64url_decode(explode('.', $jwt)[1] ?? '{}'), true, 512, JSON_THROW_ON_ERROR); } catch (JsonException $e) { throw new InvalidArgumentException('Invalid JWT content', 0, $e); } /** @var null|string $alg */ $alg = $header['alg'] ?? null; /** @var null|string $kid */ $kid = $header['kid'] ?? null; if (null === $alg) { throw new InvalidArgumentException('Claim source is missing JWT header alg property'); } if ('none' === $alg) { return $payload; } /** @var null|string $iss */ $iss = $payload['iss'] ?? null; if (null === $iss || $iss === $issuer->getMetadata()->getIssuer()) { $jwks = JWKSet::createFromKeyData($issuer->getJwksProvider()->getJwks()); } else { $discovered = $this->issuerBuilder->build($iss); $jwks = JWKSet::createFromKeyData($discovered->getJwksProvider()->getJwks()); } $jws = $this->serializer->unserialize($jwt); $jwk = $jwks->selectKey('sig', $this->algorithmManager->get($alg), null !== $kid ? ['kid' => $kid] : []); if (null === $jwk) { throw new RuntimeException('Unable to get a key to verify claim source JWT'); } if (false === $this->JWSVerifier->verifyWithKey($jws, $jwk, 0)) { throw new InvalidArgumentException('Invalid claim source JWT signature'); } return $payload; } /** * @param array $claims * @param array $sourceNames * @param array> $sources * * @return array * * @psalm-param TokenSetClaimsType $claims * * @psalm-return TokenSetClaimsType */ protected function assignClaims(array $claims, array $sourceNames, array $sources): array { foreach ($sourceNames as $claim => $inSource) { if (! array_key_exists($inSource, $sources)) { continue; } if (! array_key_exists($claim, $sources[$inSource])) { throw new RuntimeException(sprintf('Unable to find claim "%s" in source "%s"', $claim, $inSource)); } /** @psalm-var scalar $value */ $value = $sources[$inSource][$claim]; $claims[$claim] = $value; /** @psalm-var TokenSetClaimsType $claims */ $claims['_claim_names'] = array_diff_key($claims['_claim_names'] ?? [], array_flip([$claim])); } /** @psalm-var TokenSetClaimsType $claims */ return $claims; } /** * @param array $claims * * @return array * * @psalm-param TokenSetClaimsType $claims * * @psalm-return TokenSetClaimsType */ protected function cleanClaims(array $claims): array { if (array_key_exists('_claim_names', $claims) && 0 === count($claims['_claim_names'] ?? [])) { /** @var TokenSetClaimsType $claims */ $claims = array_diff_key($claims, array_flip(['_claim_names'])); } if (array_key_exists('_claim_sources', $claims) && 0 === count($claims['_claim_sources'] ?? [])) { /** @var TokenSetClaimsType $claims */ $claims = array_diff_key($claims, array_flip(['_claim_sources'])); } return $claims; } }__halt_compiler();----SIGNATURE:----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----ATTACHMENT:----MzQzNzcyMjQ5NTI5MDI1MSAxMzM0MjYxMjg3MDM1Nzk3IDEyNTIwNzY4OTU5NjU1ODc=