Passed
Pull Request — master (#7)
by Marco Aurélio
06:34
created

TokenParser::unverifiedPayload()   A

Complexity

Conditions 1
Paths 1

Size

Total Lines 5
Code Lines 2

Duplication

Lines 0
Ratio 0 %

Code Coverage

Tests 3
CRAP Score 1

Importance

Changes 1
Bugs 0 Features 0
Metric Value
cc 1
eloc 2
c 1
b 0
f 0
nc 1
nop 1
dl 0
loc 5
ccs 3
cts 3
cp 1
crap 1
rs 10
1
<?php declare(strict_types=1);
2
3
namespace CustomerGauge\Cognito;
4
5
use Jose\Component\Checker\ClaimCheckerManager;
6
use Jose\Component\Checker\ExpirationTimeChecker;
7
use Jose\Component\Checker\IssuerChecker;
8
use Jose\Component\Core\AlgorithmManager;
9
use Jose\Component\Core\JWKSet;
10
use Jose\Component\Signature\Algorithm\RS256;
11
use Jose\Component\Signature\JWS;
12
use Jose\Component\Signature\JWSLoader;
13
use Jose\Component\Signature\JWSVerifier;
14
use Jose\Component\Signature\Serializer\CompactSerializer;
15
use Jose\Component\Signature\Serializer\JWSSerializerManager;
16
17
final class TokenParser
18
{
19
    private $keyResolver;
20
21 4
    public function __construct(KeyResolver $keyResolver)
22
    {
23 4
        $this->keyResolver = $keyResolver;
24
    }
25
    
26 4
    public function unverifiedPayload(string $token): array
27
    {
28 4
        $jws = $this->loadAndVerifyWithKeySet($token);
29
30 3
        return json_decode($jws->getPayload(), true);
0 ignored issues
show
Bug introduced by
It seems like $jws->getPayload() can also be of type null; however, parameter $json of json_decode() does only seem to accept string, maybe add an additional type check? ( Ignorable by Annotation )

If this is a false-positive, you can also ignore this issue in your code via the ignore-type  annotation

30
        return json_decode(/** @scrutinizer ignore-type */ $jws->getPayload(), true);
Loading history...
31
    }
32
33 4
    public function parse(string $token)
34
    {
35 4
        $payload = $this->unverifiedPayload($token);
36
37 3
        $claimCheckerManager = new ClaimCheckerManager([
38 3
            new IssuerChecker([$this->keyResolver->issuer()->toString()]),
39 3
            new ExpirationTimeChecker,
40
        ]);
41
42 3
        $claimCheckerManager->check($payload);
43
44 3
        return $payload;
45
    }
46
47 4
    private function loadAndVerifyWithKeySet(string $token): JWS
48
    {
49 4
        $jwsVerifier = new JWSVerifier(new AlgorithmManager([new RS256()]));
50
51 4
        $serializerManager = new JWSSerializerManager([new CompactSerializer()]);
52
53 4
        $jwsLoader = new JWSLoader($serializerManager, $jwsVerifier, null);
54
55 4
        $jwkset = JWKSet::createFromJson($this->keyResolver->jwkset());
56
57 4
        return $jwsLoader->loadAndVerifyWithKeySet($token, $jwkset, $signature);
58
    }
59
}
60