Improved jwt logic
* No longer stores full token, but only payload.
This commit is contained in:
		@@ -26,7 +26,12 @@ class SseSubscriber implements SubscriberInterface
 | 
			
		||||
 | 
			
		||||
    public function isAuthorized(): bool
 | 
			
		||||
    {
 | 
			
		||||
        return $this->request->getAttribute('authorization') instanceof JWTToken;
 | 
			
		||||
        return $this->request->getAttribute('authorized');
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public function getPayload(): array
 | 
			
		||||
    {
 | 
			
		||||
        return $this->request->getAttribute('mercure.payload')??[];
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public function getId(): string
 | 
			
		||||
 
 | 
			
		||||
@@ -69,7 +69,7 @@ class TopicManager
 | 
			
		||||
                    'topic' => $topic->getTopic(),
 | 
			
		||||
                    'subscriber' => $sub->getId(),
 | 
			
		||||
                    'active' => true,
 | 
			
		||||
                    'payload' => null, // TODO populate from mercure.payload in JWT
 | 
			
		||||
                    'payload' => $sub->getPayload(),
 | 
			
		||||
                ];
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -88,17 +88,13 @@ class MercureHandler
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        // Grab the JWT token from the requests authorization attribute
 | 
			
		||||
        $tok = $request->getAttribute('authorization');
 | 
			
		||||
        if ($tok instanceof JWTToken) {
 | 
			
		||||
            $claims = $tok->claims->getAll();
 | 
			
		||||
            if (isset($claims['mercure']['subscribe'])) {
 | 
			
		||||
                $subscribeClaims = $claims['mercure']['subscribe'];
 | 
			
		||||
                if (!$this->checkTopicClaims($topics, $subscribeClaims)) {
 | 
			
		||||
                    throw new SecurityException(
 | 
			
		||||
                        message: "Insufficient permissions for subscribe", 
 | 
			
		||||
                        code: SecurityException::ERR_NO_PERMISSION
 | 
			
		||||
                    );
 | 
			
		||||
                }
 | 
			
		||||
        if ($request->getAttribute('authorized')) {
 | 
			
		||||
            $claims = $request->getAttribute('mercure.subscribe');
 | 
			
		||||
            if (!$this->checkTopicClaims($topics, $claims)) {
 | 
			
		||||
                throw new SecurityException(
 | 
			
		||||
                    message: "Insufficient permissions for subscribe", 
 | 
			
		||||
                    code: SecurityException::ERR_NO_PERMISSION
 | 
			
		||||
                );
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            // Disallow if we don't allow anonymous subscribers. Note that anonymous
 | 
			
		||||
@@ -153,18 +149,14 @@ class MercureHandler
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        // Grab the JWT token from the requests authorization attribute
 | 
			
		||||
        $tok = $request->getAttribute('authorization');
 | 
			
		||||
        if ($tok instanceof JWTToken) {
 | 
			
		||||
            $claims = $tok->claims->getAll();
 | 
			
		||||
            if (isset($claims['mercure']['publish'])) {
 | 
			
		||||
                $publishClaims = $claims['mercure']['publish'];
 | 
			
		||||
                // check topic against publishClaims
 | 
			
		||||
                if (!$this->checkTopicClaims($data['topic']??[], $publishClaims)) {
 | 
			
		||||
                    throw new SecurityException(
 | 
			
		||||
                        message: "Insufficient permissions for publish", 
 | 
			
		||||
                        code: SecurityException::ERR_NO_PERMISSION
 | 
			
		||||
                    );
 | 
			
		||||
                }
 | 
			
		||||
        if ($request->getAttribute('authorized')) {
 | 
			
		||||
            $claims = $request->getAttribute('mercure.publish');
 | 
			
		||||
            // check topic against publishClaims
 | 
			
		||||
            if (!$this->checkTopicClaims($data['topic']??[], $claims)) {
 | 
			
		||||
                throw new SecurityException(
 | 
			
		||||
                    message: "Insufficient permissions for publish", 
 | 
			
		||||
                    code: SecurityException::ERR_NO_PERMISSION
 | 
			
		||||
                );
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            // reject if access denied
 | 
			
		||||
 
 | 
			
		||||
@@ -61,11 +61,15 @@ class SecurityMiddleware
 | 
			
		||||
                    code: SecurityException::ERR_ACCESS_DENIED
 | 
			
		||||
                );
 | 
			
		||||
            }
 | 
			
		||||
            $claims = $tok->claims->getAll()['mercure']??[];
 | 
			
		||||
            return $request
 | 
			
		||||
                ->withAttribute('authorization', $tok);
 | 
			
		||||
                ->withAttribute('mercure.publish', $claims['publish']??[])
 | 
			
		||||
                ->withAttribute('mercure.subscribe', $claims['subscribe']??[])
 | 
			
		||||
                ->withAttribute('mercure.payload', $claims['payload']??[])
 | 
			
		||||
                ->withAttribute('authorized', true);
 | 
			
		||||
        } else {
 | 
			
		||||
            return $request
 | 
			
		||||
                ->withAttribute('authorization', null);
 | 
			
		||||
                ->withAttribute('authorized', false);
 | 
			
		||||
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user