2016-12-15 10:13:00 +01:00
|
|
|
<?php
|
|
|
|
namespace Shaarli\Api;
|
|
|
|
|
2017-01-04 11:41:05 +01:00
|
|
|
use Shaarli\Base64Url;
|
2016-12-15 10:13:00 +01:00
|
|
|
use Shaarli\Api\Exceptions\ApiAuthorizationException;
|
|
|
|
|
|
|
|
/**
|
2017-01-04 11:41:05 +01:00
|
|
|
* REST API utilities
|
2016-12-15 10:13:00 +01:00
|
|
|
*/
|
|
|
|
class ApiUtils
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Validates a JWT token authenticity.
|
|
|
|
*
|
|
|
|
* @param string $token JWT token extracted from the headers.
|
|
|
|
* @param string $secret API secret set in the settings.
|
|
|
|
*
|
|
|
|
* @throws ApiAuthorizationException the token is not valid.
|
|
|
|
*/
|
|
|
|
public static function validateJwtToken($token, $secret)
|
|
|
|
{
|
|
|
|
$parts = explode('.', $token);
|
|
|
|
if (count($parts) != 3 || strlen($parts[0]) == 0 || strlen($parts[1]) == 0) {
|
|
|
|
throw new ApiAuthorizationException('Malformed JWT token');
|
|
|
|
}
|
|
|
|
|
2017-01-04 11:41:05 +01:00
|
|
|
$genSign = Base64Url::encode(hash_hmac('sha512', $parts[0] .'.'. $parts[1], $secret, true));
|
2016-12-15 10:13:00 +01:00
|
|
|
if ($parts[2] != $genSign) {
|
|
|
|
throw new ApiAuthorizationException('Invalid JWT signature');
|
|
|
|
}
|
|
|
|
|
2017-01-04 11:41:05 +01:00
|
|
|
$header = json_decode(Base64Url::decode($parts[0]));
|
2016-12-15 10:13:00 +01:00
|
|
|
if ($header === null) {
|
|
|
|
throw new ApiAuthorizationException('Invalid JWT header');
|
|
|
|
}
|
|
|
|
|
2017-01-04 11:41:05 +01:00
|
|
|
$payload = json_decode(Base64Url::decode($parts[1]));
|
2016-12-15 10:13:00 +01:00
|
|
|
if ($payload === null) {
|
|
|
|
throw new ApiAuthorizationException('Invalid JWT payload');
|
|
|
|
}
|
|
|
|
|
|
|
|
if (empty($payload->iat)
|
|
|
|
|| $payload->iat > time()
|
|
|
|
|| time() - $payload->iat > ApiMiddleware::$TOKEN_DURATION
|
|
|
|
) {
|
|
|
|
throw new ApiAuthorizationException('Invalid JWT issued time');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|