Some checks failed
Close stale issues and PRs / stale (push) Has been cancelled
242 lines
7.5 KiB
TypeScript
242 lines
7.5 KiB
TypeScript
// @ts-expect-error
|
|
import jwtDecode from 'jwt-decode';
|
|
|
|
import { IReduxState } from '../../app/types';
|
|
import { isVpaasMeeting } from '../../jaas/functions';
|
|
import { getLocalParticipant } from '../participants/functions';
|
|
import { IParticipantFeatures, ParticipantFeaturesKey } from '../participants/types';
|
|
import { parseURLParams } from '../util/parseURLParams';
|
|
|
|
import { JWT_VALIDATION_ERRORS, MEET_FEATURES } from './constants';
|
|
import logger from './logger';
|
|
|
|
/**
|
|
* Retrieves the JSON Web Token (JWT), if any, defined by a specific
|
|
* {@link URL}.
|
|
*
|
|
* @param {URL} url - The {@code URL} to parse and retrieve the JSON Web Token
|
|
* (JWT), if any, from.
|
|
* @returns {string} The JSON Web Token (JWT), if any, defined by the specified
|
|
* {@code url}; otherwise, {@code undefined}.
|
|
*/
|
|
export function parseJWTFromURLParams(url: URL | typeof window.location = window.location) {
|
|
// @ts-ignore
|
|
const jwt = parseURLParams(url, false, 'hash').jwt;
|
|
|
|
// TODO: eventually remove the search param and only pull from the hash
|
|
// @ts-ignore
|
|
return jwt ? jwt : parseURLParams(url, true, 'search').jwt;
|
|
}
|
|
|
|
/**
|
|
* Returns the user name after decoding the jwt.
|
|
*
|
|
* @param {IReduxState} state - The app state.
|
|
* @returns {string}
|
|
*/
|
|
export function getJwtName(state: IReduxState) {
|
|
const { user } = state['features/base/jwt'];
|
|
|
|
return user?.name;
|
|
}
|
|
|
|
/**
|
|
* Check if the given JWT feature is enabled.
|
|
*
|
|
* @param {IReduxState} state - The app state.
|
|
* @param {string} feature - The feature we want to check.
|
|
* @param {boolean} ifNotInFeatures - Default value if features prop exists but does not have the {@code feature}.
|
|
* @returns {boolean}
|
|
*/
|
|
export function isJwtFeatureEnabled(
|
|
state: IReduxState,
|
|
feature: ParticipantFeaturesKey,
|
|
ifNotInFeatures: boolean
|
|
) {
|
|
let { features } = getLocalParticipant(state) || {};
|
|
|
|
if (typeof features === 'undefined' && isVpaasMeeting(state)) {
|
|
// for vpaas the backend is always initialized with empty features if those are missing
|
|
features = {};
|
|
}
|
|
|
|
return isJwtFeatureEnabledStateless({
|
|
localParticipantFeatures: features,
|
|
feature,
|
|
ifNotInFeatures
|
|
});
|
|
}
|
|
|
|
interface IIsJwtFeatureEnabledStatelessParams {
|
|
feature: ParticipantFeaturesKey;
|
|
ifNotInFeatures: boolean;
|
|
jwt?: string;
|
|
localParticipantFeatures?: IParticipantFeatures;
|
|
}
|
|
|
|
/**
|
|
* Check if the given JWT feature is enabled.
|
|
*
|
|
* @param {ILocalParticipant} localParticipantFeatures - The features of the local participant.
|
|
* @param {string} feature - The feature we want to check.
|
|
* @param {boolean} ifNotInFeatures - Default value if features is missing
|
|
* or prop exists but does not have the {@code feature}.
|
|
* @returns {boolean}
|
|
*/
|
|
export function isJwtFeatureEnabledStateless({
|
|
localParticipantFeatures: features,
|
|
feature,
|
|
ifNotInFeatures
|
|
}: IIsJwtFeatureEnabledStatelessParams) {
|
|
if (typeof features?.[feature] === 'undefined') {
|
|
return ifNotInFeatures;
|
|
}
|
|
|
|
return String(features[feature]) === 'true';
|
|
}
|
|
|
|
/**
|
|
* Checks whether a given timestamp is a valid UNIX timestamp in seconds.
|
|
* We convert to milliseconds during the check since `Date` works with milliseconds for UNIX timestamp values.
|
|
*
|
|
* @param {any} timestamp - A UNIX timestamp in seconds as stored in the jwt.
|
|
* @returns {boolean} - Whether the timestamp is indeed a valid UNIX timestamp or not.
|
|
*/
|
|
function isValidUnixTimestamp(timestamp: number | string) {
|
|
return typeof timestamp === 'number' && timestamp * 1000 === new Date(timestamp * 1000).getTime();
|
|
}
|
|
|
|
/**
|
|
* Returns a list with all validation errors for the given jwt.
|
|
*
|
|
* @param {string} jwt - The jwt.
|
|
* @returns {Array} - An array containing all jwt validation errors.
|
|
*/
|
|
export function validateJwt(jwt: string) {
|
|
const errors: Object[] = [];
|
|
const currentTimestamp = new Date().getTime();
|
|
|
|
try {
|
|
const header = jwtDecode(jwt, { header: true });
|
|
const payload = jwtDecode(jwt);
|
|
|
|
if (!header) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.HEADER_NOT_FOUND });
|
|
|
|
return errors;
|
|
}
|
|
|
|
if (!payload) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.PAYLOAD_NOT_FOUND });
|
|
|
|
return errors;
|
|
}
|
|
|
|
const {
|
|
aud,
|
|
context,
|
|
exp,
|
|
iss,
|
|
nbf,
|
|
sub
|
|
} = payload;
|
|
|
|
// JaaS only
|
|
if (sub?.startsWith('vpaas-magic-cookie')) {
|
|
const { kid } = header;
|
|
|
|
// if Key ID is missing, we return the error immediately without further validations.
|
|
if (!kid) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.KID_NOT_FOUND });
|
|
|
|
return errors;
|
|
}
|
|
|
|
if (kid.substring(0, kid.indexOf('/')) !== sub) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.KID_MISMATCH });
|
|
}
|
|
|
|
if (aud !== 'jitsi') {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.AUD_INVALID });
|
|
}
|
|
|
|
if (iss !== 'chat') {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.ISS_INVALID });
|
|
}
|
|
|
|
if (!context?.features) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.FEATURES_NOT_FOUND });
|
|
}
|
|
}
|
|
|
|
if (nbf) { // nbf value is optional
|
|
if (!isValidUnixTimestamp(nbf)) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.NBF_INVALID });
|
|
} else if (currentTimestamp < nbf * 1000) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.NBF_FUTURE });
|
|
}
|
|
}
|
|
|
|
if (!isValidUnixTimestamp(exp)) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.EXP_INVALID });
|
|
} else if (currentTimestamp > exp * 1000) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.TOKEN_EXPIRED });
|
|
}
|
|
|
|
if (!context) {
|
|
errors.push({ key: JWT_VALIDATION_ERRORS.CONTEXT_NOT_FOUND });
|
|
} else if (context.features) {
|
|
const { features } = context;
|
|
const meetFeatures = Object.values(MEET_FEATURES);
|
|
|
|
(Object.keys(features) as ParticipantFeaturesKey[]).forEach(feature => {
|
|
if (meetFeatures.includes(feature)) {
|
|
const featureValue = features[feature];
|
|
|
|
// cannot use truthy or falsy because we need the exact value and type check.
|
|
if (
|
|
featureValue !== true
|
|
&& featureValue !== false
|
|
&& featureValue !== 'true'
|
|
&& featureValue !== 'false'
|
|
) {
|
|
errors.push({
|
|
key: JWT_VALIDATION_ERRORS.FEATURE_VALUE_INVALID,
|
|
args: { feature }
|
|
});
|
|
}
|
|
} else {
|
|
errors.push({
|
|
key: JWT_VALIDATION_ERRORS.FEATURE_INVALID,
|
|
args: { feature }
|
|
});
|
|
}
|
|
});
|
|
}
|
|
} catch (e: any) {
|
|
logger.error(`Unspecified JWT error${e?.message ? `: ${e.message}` : ''}`);
|
|
}
|
|
|
|
return errors;
|
|
}
|
|
|
|
/**
|
|
* Extracts and returns the expiration date of jwt.
|
|
*
|
|
* @param {string|undefined} jwt - The jwt to check.
|
|
* @returns {Date} The expiration date of the jwt.
|
|
*/
|
|
export function getJwtExpirationDate(jwt: string | undefined) {
|
|
if (!jwt) {
|
|
return;
|
|
}
|
|
|
|
const payload = jwtDecode(jwt);
|
|
|
|
if (payload) {
|
|
const { exp } = payload;
|
|
|
|
return new Date(exp * 1000);
|
|
}
|
|
}
|