yuzu/src/web_service/verify_user_jwt.cpp

71 lines
2.8 KiB
C++
Raw Normal View History

// SPDX-FileCopyrightText: Copyright 2018 Citra Emulator Project
// SPDX-License-Identifier: GPL-2.0-or-later
2022-07-15 20:45:35 +03:00
2022-07-15 22:11:09 +03:00
#if defined(__GNUC__) || defined(__clang__)
#pragma GCC diagnostic push
#pragma GCC diagnostic ignored "-Wimplicit-fallthrough"
#pragma GCC diagnostic ignored "-Wdeprecated-declarations" // for deprecated OpenSSL functions
2022-07-15 22:11:09 +03:00
#endif
2022-07-15 20:45:35 +03:00
#include <jwt/jwt.hpp>
2022-07-15 22:11:09 +03:00
#if defined(__GNUC__) || defined(__clang__)
#pragma GCC diagnostic pop
#endif
#include <system_error>
2022-07-15 20:45:35 +03:00
#include "common/logging/log.h"
#include "web_service/verify_user_jwt.h"
#include "web_service/web_backend.h"
#include "web_service/web_result.h"
namespace WebService {
static std::string public_key;
std::string GetPublicKey(const std::string& host) {
if (public_key.empty()) {
Client client(host, "", ""); // no need for credentials here
public_key = client.GetPlain("/jwt/external/key.pem", true).returned_data;
if (public_key.empty()) {
LOG_ERROR(WebService, "Could not fetch external JWT public key, verification may fail");
} else {
LOG_INFO(WebService, "Fetched external JWT public key (size={})", public_key.size());
}
}
return public_key;
}
VerifyUserJWT::VerifyUserJWT(const std::string& host) : pub_key(GetPublicKey(host)) {}
Network::VerifyUser::UserData VerifyUserJWT::LoadUserData(const std::string& verify_uid,
2022-07-15 20:45:35 +03:00
const std::string& token) {
const std::string audience = fmt::format("external-{}", verify_uid);
2022-07-15 20:45:35 +03:00
using namespace jwt::params;
std::error_code error;
2022-07-30 06:57:26 +03:00
// We use the Citra backend so the issuer is citra-core
2022-07-15 20:45:35 +03:00
auto decoded =
2022-07-30 06:57:26 +03:00
jwt::decode(token, algorithms({"rs256"}), error, secret(pub_key), issuer("citra-core"),
2022-07-15 20:45:35 +03:00
aud(audience), validate_iat(true), validate_jti(true));
if (error) {
LOG_INFO(WebService, "Verification failed: category={}, code={}, message={}",
error.category().name(), error.value(), error.message());
return {};
}
Network::VerifyUser::UserData user_data{};
if (decoded.payload().has_claim("username")) {
user_data.username = decoded.payload().get_claim_value<std::string>("username");
}
if (decoded.payload().has_claim("displayName")) {
user_data.display_name = decoded.payload().get_claim_value<std::string>("displayName");
}
if (decoded.payload().has_claim("avatarUrl")) {
user_data.avatar_url = decoded.payload().get_claim_value<std::string>("avatarUrl");
}
if (decoded.payload().has_claim("roles")) {
auto roles = decoded.payload().get_claim_value<std::vector<std::string>>("roles");
user_data.moderator = std::find(roles.begin(), roles.end(), "moderator") != roles.end();
}
return user_data;
}
} // namespace WebService