o2system /
security
| 1 | <?php |
||||
| 2 | /** |
||||
| 3 | * This file is part of the O2System Framework package. |
||||
| 4 | * |
||||
| 5 | * For the full copyright and license information, please view the LICENSE |
||||
| 6 | * file that was distributed with this source code. |
||||
| 7 | * |
||||
| 8 | * @author Steeve Andrian Salim |
||||
| 9 | * @copyright Copyright (c) Steeve Andrian Salim |
||||
| 10 | */ |
||||
| 11 | |||||
| 12 | // ------------------------------------------------------------------------ |
||||
| 13 | |||||
| 14 | namespace O2System\Security\Authentication; |
||||
| 15 | |||||
| 16 | // ------------------------------------------------------------------------ |
||||
| 17 | |||||
| 18 | use O2System\Security\Encoders\Base64; |
||||
| 19 | use O2System\Security\Encoders\Json; |
||||
| 20 | use O2System\Security\Authentication\User\Signature; |
||||
| 21 | use O2System\Security\Encryptions\Algorithm; |
||||
| 22 | use O2System\Security\Generators\Token; |
||||
| 23 | |||||
| 24 | /** |
||||
| 25 | * Class JsonWebToken |
||||
| 26 | * @package O2System\Security\Authentication |
||||
| 27 | */ |
||||
| 28 | class JsonWebToken extends Token |
||||
| 29 | { |
||||
| 30 | protected $keyId; |
||||
| 31 | |||||
| 32 | /** |
||||
| 33 | * When checking nbf, iat or expiration times, |
||||
| 34 | * we want to provide some extra leeway time to |
||||
| 35 | * account for clock skew. |
||||
| 36 | */ |
||||
| 37 | protected $leeway = 0; |
||||
| 38 | |||||
| 39 | protected $headers = [ |
||||
| 40 | 'typ' => 'JWT', |
||||
| 41 | ]; |
||||
| 42 | |||||
| 43 | // ------------------------------------------------------------------------ |
||||
| 44 | |||||
| 45 | public function setKeyId($keyId) |
||||
| 46 | { |
||||
| 47 | $this->keyId = $keyId; |
||||
| 48 | |||||
| 49 | return $this; |
||||
| 50 | } |
||||
| 51 | |||||
| 52 | // ------------------------------------------------------------------------ |
||||
| 53 | |||||
| 54 | public function setLeeway($leeway) |
||||
| 55 | { |
||||
| 56 | $this->leeway = intval($leeway); |
||||
| 57 | |||||
| 58 | return $this; |
||||
| 59 | } |
||||
| 60 | |||||
| 61 | // ------------------------------------------------------------------------ |
||||
| 62 | |||||
| 63 | public function encode(array $payload, $key = null) |
||||
| 64 | { |
||||
| 65 | $key = empty($key) ? $this->key : $key; |
||||
| 66 | if (is_null($key)) { |
||||
| 67 | if (class_exists('O2System\Framework', false)) { |
||||
| 68 | $key = config()->getItem('security')->encryptionKey; |
||||
|
0 ignored issues
–
show
Bug
introduced
by
Loading history...
|
|||||
| 69 | } |
||||
| 70 | } |
||||
| 71 | |||||
| 72 | $this->addHeader('alg', $this->algorithm); |
||||
| 73 | |||||
| 74 | if ( ! empty($this->keyId)) { |
||||
| 75 | $this->addHeader('kid', $this->keyId); |
||||
| 76 | } |
||||
| 77 | |||||
| 78 | // Create Header Segment |
||||
| 79 | $segments[] = Base64::encode(Json::encode($this->headers)); |
||||
|
0 ignored issues
–
show
Comprehensibility
Best Practice
introduced
by
|
|||||
| 80 | |||||
| 81 | // Create Payload Segment |
||||
| 82 | $segments[] = Base64::encode(Json::encode($payload)); |
||||
| 83 | |||||
| 84 | // Create Signature Segment |
||||
| 85 | $segments[] = Base64::encode(Signature::generate($segments, $key, $this->algorithm)); |
||||
| 86 | |||||
| 87 | return implode('.', $segments); |
||||
| 88 | } |
||||
| 89 | |||||
| 90 | // ------------------------------------------------------------------------ |
||||
| 91 | |||||
| 92 | public function decode($token, $key = null) |
||||
| 93 | { |
||||
| 94 | $key = empty($key) ? $this->key : $key; |
||||
| 95 | if (is_null($key)) { |
||||
| 96 | if (class_exists('O2System\Framework', false)) { |
||||
| 97 | $key = config()->getItem('security')->encryptionKey; |
||||
|
0 ignored issues
–
show
The function
config was not found. Maybe you did not declare it correctly or list all dependencies?
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
Loading history...
|
|||||
| 98 | } |
||||
| 99 | } |
||||
| 100 | |||||
| 101 | $timestamp = empty($this->timestamp) ? time() : $this->timestamp; |
||||
| 102 | |||||
| 103 | $segments = explode('.', $token); |
||||
| 104 | $segments = array_map('trim', $segments); |
||||
| 105 | |||||
| 106 | if (count($segments) == 3) { |
||||
| 107 | list($headers, $payload, $signature) = $segments; |
||||
| 108 | |||||
| 109 | // Base64 decode headers |
||||
| 110 | if (false === ($headers = Base64::decode($headers))) { |
||||
| 111 | $this->errors[] = 'Invalid header base64 decoding'; |
||||
| 112 | |||||
| 113 | return false; |
||||
| 114 | } |
||||
| 115 | |||||
| 116 | // Json decode headers |
||||
| 117 | if (null === ($headers = Json::decode($headers))) { |
||||
| 118 | $this->errors[] = 'Invalid header json decoding'; |
||||
| 119 | |||||
| 120 | return false; |
||||
| 121 | } |
||||
| 122 | |||||
| 123 | // Validate algorithm header |
||||
| 124 | if (empty($headers->alg)) { |
||||
| 125 | $this->errors[] = 'Invalid algorithm'; |
||||
| 126 | |||||
| 127 | return false; |
||||
| 128 | } elseif ( ! Algorithm::validate($headers->alg)) { |
||||
| 129 | $this->errors[] = 'Unsupported algorithm'; |
||||
| 130 | |||||
| 131 | return false; |
||||
| 132 | } |
||||
| 133 | |||||
| 134 | // Validate algorithm key id |
||||
| 135 | if (is_array($key) or $key instanceof \ArrayAccess) { |
||||
| 136 | if (isset($headers->kid)) { |
||||
| 137 | if ( ! isset($key[ $headers->kid ])) { |
||||
| 138 | $this->errors[] = 'Invalid Key Id'; |
||||
| 139 | |||||
| 140 | return false; |
||||
| 141 | } |
||||
| 142 | |||||
| 143 | $key = $key[ $headers->kid ]; |
||||
| 144 | } else { |
||||
| 145 | $this->errors[] = 'Empty Key id'; |
||||
| 146 | |||||
| 147 | return false; |
||||
| 148 | } |
||||
| 149 | } |
||||
| 150 | |||||
| 151 | // Base64 decode payload |
||||
| 152 | if (false === ($payload = Base64::decode($payload))) { |
||||
| 153 | $this->errors[] = 'Invalid payload base64 decoding'; |
||||
| 154 | |||||
| 155 | return false; |
||||
| 156 | } |
||||
| 157 | |||||
| 158 | // Json decode payload |
||||
| 159 | if (null === ($payload = Json::decode($payload))) { |
||||
| 160 | $this->errors[] = 'Invalid payload json decoding'; |
||||
| 161 | |||||
| 162 | return false; |
||||
| 163 | } |
||||
| 164 | |||||
| 165 | // Base64 decode payload |
||||
| 166 | if (false === ($signature = Base64::decode($signature))) { |
||||
| 167 | $this->errors[] = 'Invalid signature base64 decoding'; |
||||
| 168 | |||||
| 169 | return false; |
||||
| 170 | } |
||||
| 171 | |||||
| 172 | if (Signature::verify($token, $signature, $key, $headers->alg) === false) { |
||||
| 173 | $this->errors[] = 'Invalid signature'; |
||||
| 174 | |||||
| 175 | return false; |
||||
| 176 | } |
||||
| 177 | |||||
| 178 | // Check if the nbf if it is defined. This is the time that the |
||||
| 179 | // token can actually be used. If it's not yet that time, abort. |
||||
| 180 | if (isset($payload->nbf) && $payload->nbf > ($timestamp + $this->leeway)) { |
||||
| 181 | $this->errors[] = 'Cannot handle token prior to ' . date(\DateTime::ISO8601, $payload->nbf); |
||||
| 182 | |||||
| 183 | return false; |
||||
| 184 | } |
||||
| 185 | |||||
| 186 | // Check that this token has been created before 'now'. This prevents |
||||
| 187 | // using tokens that have been created for later use (and haven't |
||||
| 188 | // correctly used the nbf claim). |
||||
| 189 | if (isset($payload->iat) && $payload->iat > ($timestamp + $this->leeway)) { |
||||
| 190 | $this->errors[] = 'Cannot handle token prior to ' . date(\DateTime::ISO8601, $payload->iat); |
||||
| 191 | |||||
| 192 | return false; |
||||
| 193 | } |
||||
| 194 | // Check if this token has expired. |
||||
| 195 | if (isset($payload->exp) && ($timestamp - $this->leeway) >= $payload->exp) { |
||||
| 196 | $this->errors[] = 'Expired token'; |
||||
| 197 | |||||
| 198 | return false; |
||||
| 199 | } |
||||
| 200 | |||||
| 201 | return $payload; |
||||
| 202 | } |
||||
| 203 | |||||
| 204 | return false; |
||||
| 205 | } |
||||
| 206 | } |