psr7-sessions /
storageless
This project does not seem to handle request data directly as such no vulnerable execution paths were found.
include, or for example
via PHP's auto-loading mechanism.
These results are based on our legacy PHP analysis, consider migrating to our new PHP analysis engine instead. Learn more
| 1 | <?php |
||
| 2 | /* |
||
| 3 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
||
| 4 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
||
| 5 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
||
| 6 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
||
| 7 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||
| 8 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
||
| 9 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
||
| 10 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
||
| 11 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||
| 12 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
||
| 13 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||
| 14 | * |
||
| 15 | * This software consists of voluntary contributions made by many individuals |
||
| 16 | * and is licensed under the MIT license. |
||
| 17 | */ |
||
| 18 | |||
| 19 | declare(strict_types=1); |
||
| 20 | |||
| 21 | namespace PSR7Sessions\Storageless\Http; |
||
| 22 | |||
| 23 | use BadMethodCallException; |
||
| 24 | use Dflydev\FigCookies\FigResponseCookies; |
||
| 25 | use Dflydev\FigCookies\Modifier\SameSite; |
||
| 26 | use Dflydev\FigCookies\SetCookie; |
||
| 27 | use InvalidArgumentException; |
||
| 28 | use Lcobucci\Clock\Clock; |
||
| 29 | use Lcobucci\Clock\SystemClock; |
||
| 30 | use Lcobucci\JWT\Builder; |
||
| 31 | use Lcobucci\JWT\Parser; |
||
| 32 | use Lcobucci\JWT\Signer; |
||
| 33 | use Lcobucci\JWT\Token; |
||
| 34 | use Lcobucci\JWT\ValidationData; |
||
| 35 | use OutOfBoundsException; |
||
| 36 | use Psr\Http\Message\ResponseInterface as Response; |
||
| 37 | use Psr\Http\Message\ServerRequestInterface as Request; |
||
| 38 | use Psr\Http\Server\MiddlewareInterface; |
||
| 39 | use Psr\Http\Server\RequestHandlerInterface; |
||
| 40 | use PSR7Sessions\Storageless\Session\DefaultSessionData; |
||
| 41 | use PSR7Sessions\Storageless\Session\LazySession; |
||
| 42 | use PSR7Sessions\Storageless\Session\SessionInterface; |
||
| 43 | use stdClass; |
||
| 44 | |||
| 45 | final class SessionMiddleware implements MiddlewareInterface |
||
| 46 | { |
||
| 47 | public const ISSUED_AT_CLAIM = 'iat'; |
||
| 48 | public const SESSION_CLAIM = 'session-data'; |
||
| 49 | public const SESSION_ATTRIBUTE = 'session'; |
||
| 50 | public const DEFAULT_COOKIE = 'slsession'; |
||
| 51 | public const DEFAULT_REFRESH_TIME = 60; |
||
| 52 | |||
| 53 | private Signer $signer; |
||
|
0 ignored issues
–
show
Bug
introduced
by
Loading history...
|
|||
| 54 | |||
| 55 | private string $signatureKey; |
||
| 56 | |||
| 57 | private string $verificationKey; |
||
| 58 | |||
| 59 | private int $expirationTime; |
||
| 60 | |||
| 61 | private int $refreshTime; |
||
| 62 | |||
| 63 | private Parser $tokenParser; |
||
| 64 | |||
| 65 | private SetCookie $defaultCookie; |
||
| 66 | |||
| 67 | private Clock $clock; |
||
| 68 | |||
| 69 | 13 | public function __construct( |
|
| 70 | Signer $signer, |
||
| 71 | string $signatureKey, |
||
| 72 | string $verificationKey, |
||
| 73 | SetCookie $defaultCookie, |
||
| 74 | Parser $tokenParser, |
||
| 75 | int $expirationTime, |
||
| 76 | Clock $clock, |
||
| 77 | int $refreshTime = self::DEFAULT_REFRESH_TIME |
||
| 78 | ) { |
||
| 79 | 13 | $this->signer = $signer; |
|
| 80 | 13 | $this->signatureKey = $signatureKey; |
|
| 81 | 13 | $this->verificationKey = $verificationKey; |
|
| 82 | 13 | $this->tokenParser = $tokenParser; |
|
| 83 | 13 | $this->defaultCookie = clone $defaultCookie; |
|
| 84 | 13 | $this->expirationTime = $expirationTime; |
|
| 85 | 13 | $this->clock = $clock; |
|
| 86 | 13 | $this->refreshTime = $refreshTime; |
|
| 87 | 13 | } |
|
| 88 | |||
| 89 | /** |
||
| 90 | * This constructor simplifies instantiation when using HTTPS (REQUIRED!) and symmetric key encryption |
||
| 91 | */ |
||
| 92 | 3 | public static function fromSymmetricKeyDefaults(string $symmetricKey, int $expirationTime) : self |
|
| 93 | { |
||
| 94 | 3 | return new self( |
|
| 95 | 3 | new Signer\Hmac\Sha256(), |
|
| 96 | $symmetricKey, |
||
| 97 | $symmetricKey, |
||
| 98 | 3 | SetCookie::create(self::DEFAULT_COOKIE) |
|
| 99 | 3 | ->withSecure(true) |
|
| 100 | 3 | ->withHttpOnly(true) |
|
| 101 | 3 | ->withSameSite(SameSite::lax()) |
|
| 102 | 3 | ->withPath('/'), |
|
| 103 | 3 | new Parser(), |
|
| 104 | $expirationTime, |
||
| 105 | 3 | new SystemClock() |
|
| 106 | ); |
||
| 107 | } |
||
| 108 | |||
| 109 | /** |
||
| 110 | * This constructor simplifies instantiation when using HTTPS (REQUIRED!) and asymmetric key encryption |
||
| 111 | * based on RSA keys |
||
| 112 | */ |
||
| 113 | 3 | public static function fromAsymmetricKeyDefaults( |
|
| 114 | string $privateRsaKey, |
||
| 115 | string $publicRsaKey, |
||
| 116 | int $expirationTime |
||
| 117 | ) : self { |
||
| 118 | 3 | return new self( |
|
| 119 | 3 | new Signer\Rsa\Sha256(), |
|
| 120 | $privateRsaKey, |
||
| 121 | $publicRsaKey, |
||
| 122 | 3 | SetCookie::create(self::DEFAULT_COOKIE) |
|
| 123 | 3 | ->withSecure(true) |
|
| 124 | 3 | ->withHttpOnly(true) |
|
| 125 | 3 | ->withSameSite(SameSite::lax()) |
|
| 126 | 3 | ->withPath('/'), |
|
| 127 | 3 | new Parser(), |
|
| 128 | $expirationTime, |
||
| 129 | 3 | new SystemClock() |
|
| 130 | ); |
||
| 131 | } |
||
| 132 | |||
| 133 | /** |
||
| 134 | * {@inheritdoc} |
||
| 135 | * |
||
| 136 | * @throws BadMethodCallException |
||
| 137 | * @throws InvalidArgumentException |
||
| 138 | */ |
||
| 139 | 49 | public function process(Request $request, RequestHandlerInterface $delegate) : Response |
|
| 140 | { |
||
| 141 | 49 | $token = $this->parseToken($request); |
|
| 142 | $sessionContainer = LazySession::fromContainerBuildingCallback(function () use ($token) : SessionInterface { |
||
| 143 | 44 | return $this->extractSessionContainer($token); |
|
| 144 | 49 | }); |
|
| 145 | |||
| 146 | 49 | return $this->appendToken( |
|
| 147 | 49 | $sessionContainer, |
|
| 148 | 49 | $delegate->handle($request->withAttribute(self::SESSION_ATTRIBUTE, $sessionContainer)), |
|
| 149 | $token |
||
| 150 | ); |
||
| 151 | } |
||
| 152 | |||
| 153 | /** |
||
| 154 | * Extract the token from the given request object |
||
| 155 | */ |
||
| 156 | 49 | private function parseToken(Request $request) : ?Token |
|
| 157 | { |
||
| 158 | 49 | $cookies = $request->getCookieParams(); |
|
| 159 | 49 | $cookieName = $this->defaultCookie->getName(); |
|
| 160 | |||
| 161 | 49 | if (! isset($cookies[$cookieName])) { |
|
| 162 | 27 | return null; |
|
| 163 | } |
||
| 164 | |||
| 165 | try { |
||
| 166 | 32 | $token = $this->tokenParser->parse($cookies[$cookieName]); |
|
| 167 | 3 | } catch (InvalidArgumentException $invalidToken) { |
|
| 168 | 3 | return null; |
|
| 169 | } |
||
| 170 | |||
| 171 | 29 | if (! $token->validate(new ValidationData())) { |
|
| 172 | 6 | return null; |
|
| 173 | } |
||
| 174 | |||
| 175 | 23 | return $token; |
|
| 176 | } |
||
| 177 | |||
| 178 | /** |
||
| 179 | * @throws OutOfBoundsException |
||
| 180 | */ |
||
| 181 | 44 | private function extractSessionContainer(?Token $token) : SessionInterface |
|
| 182 | { |
||
| 183 | 44 | if (! $token) { |
|
| 184 | 36 | return DefaultSessionData::newEmptySession(); |
|
| 185 | } |
||
| 186 | |||
| 187 | try { |
||
| 188 | 18 | if (! $token->verify($this->signer, $this->verificationKey)) { |
|
| 189 | 1 | return DefaultSessionData::newEmptySession(); |
|
| 190 | } |
||
| 191 | |||
| 192 | 14 | return DefaultSessionData::fromDecodedTokenData( |
|
| 193 | 14 | (object) $token->getClaim(self::SESSION_CLAIM, new stdClass()) |
|
| 194 | ); |
||
| 195 | 3 | } catch (BadMethodCallException $invalidToken) { |
|
| 196 | 3 | return DefaultSessionData::newEmptySession(); |
|
| 197 | } |
||
| 198 | } |
||
| 199 | |||
| 200 | /** |
||
| 201 | * @throws BadMethodCallException |
||
| 202 | * @throws InvalidArgumentException |
||
| 203 | */ |
||
| 204 | 49 | private function appendToken(SessionInterface $sessionContainer, Response $response, ?Token $token) : Response |
|
| 205 | { |
||
| 206 | 49 | $sessionContainerChanged = $sessionContainer->hasChanged(); |
|
| 207 | |||
| 208 | 49 | if ($sessionContainerChanged && $sessionContainer->isEmpty()) { |
|
| 209 | 3 | return FigResponseCookies::set($response, $this->getExpirationCookie()); |
|
| 210 | } |
||
| 211 | |||
| 212 | 49 | if ($sessionContainerChanged || ($this->shouldTokenBeRefreshed($token) && ! $sessionContainer->isEmpty())) { |
|
| 213 | 26 | return FigResponseCookies::set($response, $this->getTokenCookie($sessionContainer)); |
|
| 214 | } |
||
| 215 | |||
| 216 | 27 | return $response; |
|
| 217 | } |
||
| 218 | |||
| 219 | 32 | private function shouldTokenBeRefreshed(?Token $token) : bool |
|
| 220 | { |
||
| 221 | 32 | if (! ($token && $token->hasClaim(self::ISSUED_AT_CLAIM))) { |
|
| 222 | 18 | return false; |
|
| 223 | } |
||
| 224 | |||
| 225 | 14 | return $this->timestamp() >= $token->getClaim(self::ISSUED_AT_CLAIM) + $this->refreshTime; |
|
| 226 | } |
||
| 227 | |||
| 228 | /** |
||
| 229 | * @throws BadMethodCallException |
||
| 230 | */ |
||
| 231 | 26 | private function getTokenCookie(SessionInterface $sessionContainer) : SetCookie |
|
| 232 | { |
||
| 233 | 26 | $timestamp = $this->timestamp(); |
|
| 234 | |||
| 235 | return $this |
||
| 236 | 26 | ->defaultCookie |
|
| 237 | 26 | ->withValue( |
|
| 238 | 26 | (new Builder()) |
|
| 239 | 26 | ->setIssuedAt($timestamp) |
|
| 240 | 26 | ->setExpiration($timestamp + $this->expirationTime) |
|
| 241 | 26 | ->set(self::SESSION_CLAIM, $sessionContainer) |
|
| 242 | 26 | ->sign($this->signer, $this->signatureKey) |
|
| 243 | 26 | ->getToken() |
|
| 244 | 26 | ->__toString() |
|
| 245 | ) |
||
| 246 | 26 | ->withExpires($timestamp + $this->expirationTime); |
|
| 247 | } |
||
| 248 | |||
| 249 | 3 | private function getExpirationCookie() : SetCookie |
|
| 250 | { |
||
| 251 | 3 | $expirationDate = $this->clock->now()->modify('-30 days'); |
|
| 252 | |||
| 253 | return $this |
||
| 254 | 3 | ->defaultCookie |
|
| 255 | 3 | ->withValue(null) |
|
| 256 | 3 | ->withExpires($expirationDate->getTimestamp()); |
|
| 257 | } |
||
| 258 | |||
| 259 | 31 | private function timestamp() : int |
|
| 260 | { |
||
| 261 | 31 | return $this->clock->now()->getTimestamp(); |
|
| 262 | } |
||
| 263 | } |
||
| 264 |