mirror of
https://github.com/pmmp/PocketMine-MP.git
synced 2025-07-29 06:05:54 +00:00
Added JwtUtils::parse(), make ProcessLoginTask more robust
This commit is contained in:
parent
c69411c984
commit
8c2878fe5b
@ -38,22 +38,28 @@ use function strtr;
|
||||
final class JwtUtils{
|
||||
|
||||
/**
|
||||
* @return mixed[] array of claims
|
||||
* @phpstan-return array<string, mixed>
|
||||
* TODO: replace this result with an object
|
||||
*
|
||||
* @return mixed[]
|
||||
* @phpstan-return array{mixed[], mixed[], string}
|
||||
*
|
||||
* @throws \UnexpectedValueException
|
||||
*/
|
||||
public static function getClaims(string $token) : array{
|
||||
public static function parse(string $token) : array{
|
||||
$v = explode(".", $token);
|
||||
if(count($v) !== 3){
|
||||
throw new \UnexpectedValueException("Expected exactly 3 JWT parts, got " . count($v));
|
||||
}
|
||||
$result = json_decode(self::b64UrlDecode($v[1]), true);
|
||||
if(!is_array($result)){
|
||||
$header = json_decode(self::b64UrlDecode($v[0]), true);
|
||||
if(!is_array($header)){
|
||||
throw new \UnexpectedValueException("Failed to decode JWT header JSON: ". json_last_error_msg());
|
||||
}
|
||||
$body = json_decode(self::b64UrlDecode($v[1]), true);
|
||||
if(!is_array($body)){
|
||||
throw new \UnexpectedValueException("Failed to decode JWT payload JSON: " . json_last_error_msg());
|
||||
}
|
||||
|
||||
return $result;
|
||||
$signature = self::b64UrlDecode($v[2]);
|
||||
return [$header, $body, $signature];
|
||||
}
|
||||
|
||||
public static function b64UrlEncode(string $str) : string{
|
||||
|
@ -36,7 +36,6 @@ use function base64_decode;
|
||||
use function bin2hex;
|
||||
use function explode;
|
||||
use function gmp_init;
|
||||
use function json_decode;
|
||||
use function openssl_verify;
|
||||
use function str_split;
|
||||
use function strlen;
|
||||
@ -115,7 +114,11 @@ class ProcessLoginTask extends AsyncTask{
|
||||
* @throws VerifyLoginException if errors are encountered
|
||||
*/
|
||||
private function validateToken(string $jwt, ?string &$currentPublicKey, bool $first = false) : void{
|
||||
[$headB64, $payloadB64, $sigB64] = explode('.', $jwt);
|
||||
try{
|
||||
[$headers, $claims, $plainSignature] = JwtUtils::parse($jwt);
|
||||
}catch(\UnexpectedValueException $e){
|
||||
throw new VerifyLoginException("Failed to parse JWT: " . $e->getMessage(), 0, $e);
|
||||
}
|
||||
|
||||
if($currentPublicKey === null){
|
||||
if(!$first){
|
||||
@ -123,7 +126,6 @@ class ProcessLoginTask extends AsyncTask{
|
||||
}
|
||||
|
||||
//First link, check that it is self-signed
|
||||
$headers = json_decode(JwtUtils::b64UrlDecode($headB64), true);
|
||||
$currentPublicKey = $headers["x5u"];
|
||||
}
|
||||
|
||||
@ -148,8 +150,6 @@ class ProcessLoginTask extends AsyncTask{
|
||||
$this->authenticated = true; //we're signed into xbox live
|
||||
}
|
||||
|
||||
$claims = json_decode(JwtUtils::b64UrlDecode($payloadB64), true);
|
||||
|
||||
$time = time();
|
||||
if(isset($claims["nbf"]) and $claims["nbf"] > $time + self::CLOCK_DRIFT_MAX){
|
||||
throw new VerifyLoginException("%pocketmine.disconnect.invalidSession.tooEarly");
|
||||
|
@ -88,7 +88,7 @@ class LoginPacket extends DataPacket implements ServerboundPacket{
|
||||
foreach($this->chainDataJwt->chain as $k => $chain){
|
||||
//validate every chain element
|
||||
try{
|
||||
$claims = JwtUtils::getClaims($chain);
|
||||
[, $claims, ] = JwtUtils::parse($chain);
|
||||
}catch(\UnexpectedValueException $e){
|
||||
throw new PacketDecodeException($e->getMessage(), 0, $e);
|
||||
}
|
||||
@ -117,7 +117,7 @@ class LoginPacket extends DataPacket implements ServerboundPacket{
|
||||
|
||||
$this->clientDataJwt = $buffer->get($buffer->getLInt());
|
||||
try{
|
||||
$clientData = JwtUtils::getClaims($this->clientDataJwt);
|
||||
[, $clientData, ] = JwtUtils::parse($this->clientDataJwt);
|
||||
}catch(\UnexpectedValueException $e){
|
||||
throw new PacketDecodeException($e->getMessage(), 0, $e);
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user