Files
jitsi-meet/react/features/base/jwt/functions.ts
Hristo Terezov d5dd5e4560 fix(Toolbox): Stop rerendering on every action
getJwtDisabledButtons which is used as a selector will create a new array every time it is called. This will lead to unneccessary rerenders on every action where there is no difference in the result of getJwtDisabledButtons because the reference of the array will be different.
2024-06-03 14:07:22 -05:00

247 lines
7.6 KiB
TypeScript

// @ts-expect-error
import jwtDecode from 'jwt-decode';
import { IReduxState } from '../../app/types';
import { getLocalParticipant } from '../participants/functions';
import { IParticipantFeatures } from '../participants/types';
import { parseURLParams } from '../util/parseURLParams';
import { JWT_VALIDATION_ERRORS, MEET_FEATURES } from './constants';
import logger from './logger';
/**
* Retrieves the JSON Web Token (JWT), if any, defined by a specific
* {@link URL}.
*
* @param {URL} url - The {@code URL} to parse and retrieve the JSON Web Token
* (JWT), if any, from.
* @returns {string} The JSON Web Token (JWT), if any, defined by the specified
* {@code url}; otherwise, {@code undefined}.
*/
export function parseJWTFromURLParams(url: URL | typeof window.location = window.location) {
// @ts-ignore
const jwt = parseURLParams(url, false, 'hash').jwt;
// TODO: eventually remove the search param and only pull from the hash
// @ts-ignore
return jwt ? jwt : parseURLParams(url, true, 'search').jwt;
}
/**
* Returns the user name after decoding the jwt.
*
* @param {IReduxState} state - The app state.
* @returns {string}
*/
export function getJwtName(state: IReduxState) {
const { user } = state['features/base/jwt'];
return user?.name;
}
/**
* Check if the given JWT feature is enabled.
*
* @param {IReduxState} state - The app state.
* @param {string} feature - The feature we want to check.
* @param {boolean} ifNoToken - Default value if there is no token.
* @param {boolean} ifNotInFeatures - Default value if features prop exists but does not have the {@code feature}.
* @returns {bolean}
*/
export function isJwtFeatureEnabled(state: IReduxState, feature: string, ifNoToken = false, ifNotInFeatures = false) {
const { jwt } = state['features/base/jwt'];
const { features } = getLocalParticipant(state) || {};
return isJwtFeatureEnabledStateless({
jwt,
localParticipantFeatures: features,
feature,
ifNoToken,
ifNotInFeatures
});
}
interface IIsJwtFeatureEnabledStatelessParams {
feature: string;
ifNoToken?: boolean;
ifNotInFeatures?: boolean;
jwt?: string;
localParticipantFeatures?: IParticipantFeatures;
}
/**
* Check if the given JWT feature is enabled.
*
* @param {string | undefined} jwt - The jwt token.
* @param {ILocalParticipant} localParticipantFeatures - The features of the local participant.
* @param {string} feature - The feature we want to check.
* @param {boolean} ifNoToken - Default value if there is no token.
* @param {boolean} ifNotInFeatures - Default value if features prop exists but does not have the {@code feature}.
* @returns {bolean}
*/
export function isJwtFeatureEnabledStateless({
jwt,
localParticipantFeatures: features,
feature,
ifNoToken = false,
ifNotInFeatures = false
}: IIsJwtFeatureEnabledStatelessParams) {
if (!jwt) {
return ifNoToken;
}
// If `features` is undefined, act as if everything is enabled.
if (typeof features === 'undefined') {
return true;
}
if (typeof features[feature as keyof typeof features] === 'undefined') {
return ifNotInFeatures;
}
return String(features[feature as keyof typeof features]) === 'true';
}
/**
* Checks whether a given timestamp is a valid UNIX timestamp in seconds.
* We convert to milliseconds during the check since `Date` works with milliseconds for UNIX timestamp values.
*
* @param {any} timestamp - A UNIX timestamp in seconds as stored in the jwt.
* @returns {boolean} - Whether the timestamp is indeed a valid UNIX timestamp or not.
*/
function isValidUnixTimestamp(timestamp: number | string) {
return typeof timestamp === 'number' && timestamp * 1000 === new Date(timestamp * 1000).getTime();
}
/**
* Returns a list with all validation errors for the given jwt.
*
* @param {string} jwt - The jwt.
* @returns {Array} - An array containing all jwt validation errors.
*/
export function validateJwt(jwt: string) {
const errors: Object[] = [];
const currentTimestamp = new Date().getTime();
try {
const header = jwtDecode(jwt, { header: true });
const payload = jwtDecode(jwt);
if (!header) {
errors.push({ key: JWT_VALIDATION_ERRORS.HEADER_NOT_FOUND });
return errors;
}
if (!payload) {
errors.push({ key: JWT_VALIDATION_ERRORS.PAYLOAD_NOT_FOUND });
return errors;
}
const {
aud,
context,
exp,
iss,
nbf,
sub
} = payload;
// JaaS only
if (sub?.startsWith('vpaas-magic-cookie')) {
const { kid } = header;
// if Key ID is missing, we return the error immediately without further validations.
if (!kid) {
errors.push({ key: JWT_VALIDATION_ERRORS.KID_NOT_FOUND });
return errors;
}
if (kid.substring(0, kid.indexOf('/')) !== sub) {
errors.push({ key: JWT_VALIDATION_ERRORS.KID_MISMATCH });
}
if (aud !== 'jitsi') {
errors.push({ key: JWT_VALIDATION_ERRORS.AUD_INVALID });
}
if (iss !== 'chat') {
errors.push({ key: JWT_VALIDATION_ERRORS.ISS_INVALID });
}
if (!context?.features) {
errors.push({ key: JWT_VALIDATION_ERRORS.FEATURES_NOT_FOUND });
}
}
if (!isValidUnixTimestamp(nbf)) {
errors.push({ key: JWT_VALIDATION_ERRORS.NBF_INVALID });
} else if (currentTimestamp < nbf * 1000) {
errors.push({ key: JWT_VALIDATION_ERRORS.NBF_FUTURE });
}
if (!isValidUnixTimestamp(exp)) {
errors.push({ key: JWT_VALIDATION_ERRORS.EXP_INVALID });
} else if (currentTimestamp > exp * 1000) {
errors.push({ key: JWT_VALIDATION_ERRORS.TOKEN_EXPIRED });
}
if (!context) {
errors.push({ key: JWT_VALIDATION_ERRORS.CONTEXT_NOT_FOUND });
} else if (context.features) {
const { features } = context;
const meetFeatures = Object.values(MEET_FEATURES);
Object.keys(features).forEach(feature => {
if (meetFeatures.includes(feature)) {
const featureValue = features[feature];
// cannot use truthy or falsy because we need the exact value and type check.
if (
featureValue !== true
&& featureValue !== false
&& featureValue !== 'true'
&& featureValue !== 'false'
) {
errors.push({
key: JWT_VALIDATION_ERRORS.FEATURE_VALUE_INVALID,
args: { feature }
});
}
} else {
errors.push({
key: JWT_VALIDATION_ERRORS.FEATURE_INVALID,
args: { feature }
});
}
});
}
} catch (e: any) {
logger.error(`Unspecified JWT error${e?.message ? `: ${e.message}` : ''}`);
}
return errors;
}
/**
* Extracts and returns the expiration date of jwt.
*
* @param {string|undefined} jwt - The jwt to check.
* @returns {Date} The expiration date of the jwt.
*/
export function getJwtExpirationDate(jwt: string | undefined) {
if (!jwt) {
return;
}
const payload = jwtDecode(jwt);
if (payload) {
const { exp } = payload;
return new Date(exp * 1000);
}
}