|
1
|
|
|
<?php declare(strict_types=1); |
|
2
|
|
|
/** |
|
3
|
|
|
* This file is part of the daikon-cqrs/security-interop project. |
|
4
|
|
|
* |
|
5
|
|
|
* For the full copyright and license information, please view the LICENSE |
|
6
|
|
|
* file that was distributed with this source code. |
|
7
|
|
|
*/ |
|
8
|
|
|
|
|
9
|
|
|
namespace Daikon\Security\Middleware; |
|
10
|
|
|
|
|
11
|
|
|
use Daikon\Config\ConfigProviderInterface; |
|
12
|
|
|
use Daikon\Interop\Assertion; |
|
13
|
|
|
use Firebase\JWT\JWT; |
|
14
|
|
|
use Psr\Http\Message\ResponseInterface; |
|
15
|
|
|
use Psr\Http\Message\ServerRequestInterface; |
|
16
|
|
|
use Psr\Http\Server\MiddlewareInterface; |
|
17
|
|
|
use Psr\Http\Server\RequestHandlerInterface; |
|
18
|
|
|
use UnexpectedValueException; |
|
19
|
|
|
|
|
20
|
|
|
final class JwtDecoder implements MiddlewareInterface |
|
21
|
|
|
{ |
|
22
|
|
|
public const DEFAULT_ATTR_JWT = '__Host-_jwt'; |
|
23
|
|
|
public const DEFAULT_ATTR_XSRF = '__Host-_xsrf'; |
|
24
|
|
|
public const DEFAULT_HEADER_XSRF = 'X-XSRF-TOKEN'; |
|
25
|
|
|
|
|
26
|
|
|
private ConfigProviderInterface $config; |
|
27
|
|
|
|
|
28
|
3 |
|
public function __construct(ConfigProviderInterface $config) |
|
29
|
|
|
{ |
|
30
|
3 |
|
$this->config = $config; |
|
31
|
3 |
|
} |
|
32
|
|
|
|
|
33
|
3 |
|
public function process(ServerRequestInterface $request, RequestHandlerInterface $handler): ResponseInterface |
|
34
|
|
|
{ |
|
35
|
3 |
|
$authConfig = $this->config->get('project.authentication', []); |
|
36
|
3 |
|
$jwtAttribute = $authConfig['cookies']['jwt']['attribute'] ?? self::DEFAULT_ATTR_JWT; |
|
37
|
3 |
|
$xsrfAttribute = $authConfig['cookies']['xsrf']['attribute'] ?? self::DEFAULT_ATTR_XSRF; |
|
38
|
3 |
|
$xsrfHeader = $authConfig['cookies']['xsrf']['header'] ?? self::DEFAULT_HEADER_XSRF; |
|
39
|
|
|
|
|
40
|
3 |
|
$cookieParams = $request->getCookieParams(); |
|
41
|
3 |
|
$encodedJwt = $cookieParams[$jwtAttribute] ?? $this->parseAuthHeader($request->getHeaderLine('Authorization')); |
|
42
|
3 |
|
$xsrfToken = $cookieParams[$xsrfAttribute] ?? $request->getHeaderLine($xsrfHeader); |
|
43
|
|
|
|
|
44
|
3 |
|
$decodedJwt = $encodedJwt ? $this->decodeJwt($encodedJwt) : null; |
|
45
|
|
|
|
|
46
|
3 |
|
return $handler->handle( |
|
47
|
3 |
|
$request->withAttribute($jwtAttribute, $decodedJwt)->withAttribute($xsrfAttribute, $xsrfToken) |
|
48
|
|
|
); |
|
49
|
|
|
} |
|
50
|
|
|
|
|
51
|
2 |
|
private function decodeJwt(string $jwt): ?object |
|
52
|
|
|
{ |
|
53
|
2 |
|
$secretKey = $this->config->get('project.authentication.cookies.jwt.secret'); |
|
54
|
2 |
|
Assertion::notBlank($secretKey, 'A jwt secret encoding key is required.'); |
|
55
|
|
|
|
|
56
|
|
|
try { |
|
57
|
2 |
|
return JWT::decode($jwt, $secretKey, ['HS256']); |
|
58
|
1 |
|
} catch (UnexpectedValueException $error) { |
|
59
|
1 |
|
return null; |
|
60
|
|
|
} |
|
61
|
|
|
} |
|
62
|
|
|
|
|
63
|
3 |
|
private function parseAuthHeader(string $header): ?string |
|
64
|
|
|
{ |
|
65
|
3 |
|
return preg_match('/^Bearer\s+(?<token>[\w\.-]+)$/i', $header, $matches) |
|
66
|
2 |
|
? $matches['token'] |
|
67
|
3 |
|
: null; |
|
68
|
|
|
} |
|
69
|
|
|
} |
|
70
|
|
|
|