Files
idpan.poznan.pl/administrator/components/com_akeebabackup/webpush/WebPush/VAPID.php
2026-02-08 21:16:11 +01:00

251 lines
7.7 KiB
PHP

<?php
/**
* Akeeba WebPush
*
* An abstraction layer for easier implementation of WebPush in Joomla components.
*
* @copyright (c) 2022 Akeeba Ltd
* @license GNU GPL v3 or later; see LICENSE.txt
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
declare(strict_types=1);
namespace Akeeba\WebPush\WebPush;
use Base64Url\Base64Url;
use DateTimeImmutable;
use Lcobucci\JWT\Configuration;
use Lcobucci\JWT\Signer\Ecdsa\Sha256;
use Lcobucci\JWT\Signer\Key\InMemory;
/**
* This class is a derivative work based on the WebPush library by Louis Lagrange. It has been modified to only use
* dependencies shipped with Joomla itself and must not be confused with the original work.
*
* You can find the original code at https://github.com/web-push-libs
*
* The original code came with the following copyright notice:
*
* =====================================================================================================================
*
* This file is part of the WebPush library.
*
* (c) Louis Lagrange <lagrange.louis@gmail.com>
*
* For the full copyright and license information, please view the LICENSE-LAGRANGE.txt
* file that was distributed with this source code.
*
* =====================================================================================================================
*/
class VAPID
{
private const PUBLIC_KEY_LENGTH = 65;
private const PRIVATE_KEY_LENGTH = 32;
/**
* This method creates VAPID keys in case you would not be able to have a Linux bash.
* DO NOT create keys at each initialization! Save those keys and reuse them.
*
* @throws \ErrorException
*/
public static function createVapidKeys(): array
{
$keyData = self::createECKeyUsingOpenSSL();
$binaryPublicKey = hex2bin(Utils::serializePublicKeyFromData($keyData));
if (!$binaryPublicKey)
{
throw new \ErrorException('Failed to convert VAPID public key from hexadecimal to binary');
}
$binaryPrivateKey = hex2bin(str_pad(bin2hex($keyData['d']), 2 * self::PRIVATE_KEY_LENGTH, '0', STR_PAD_LEFT));
if (!$binaryPrivateKey)
{
throw new \ErrorException('Failed to convert VAPID private key from hexadecimal to binary');
}
return [
'publicKey' => Base64Url::encode($binaryPublicKey),
'privateKey' => Base64Url::encode($binaryPrivateKey),
];
}
/**
* This method takes the required VAPID parameters and returns the required
* header to be added to a Web Push Protocol Request.
*
* @param string $audience This must be the origin of the push service
* @param string $subject This should be a URL or a 'mailto:' email address
* @param string $publicKey The decoded VAPID public key
* @param string $signingKey The decoded VAPID private key
* @param null|int $expiration The expiration of the VAPID JWT. (UNIX timestamp)
*
* @return array Returns an array with the 'Authorization' and 'Crypto-Key' values to be used as headers
* @throws \ErrorException
*/
public static function getVapidHeaders(string $audience, string $subject, string $publicKey, string $signingKey, string $contentEncoding, ?int $expiration = null)
{
if (!class_exists(\Lcobucci\JWT\Signer\OpenSSL::class, false))
{
require_once __DIR__ . '/../Workarounds/OpenSSL.php';
}
// Get the full key data from the public and private key
$keyData = Utils::unserializePublicKey($publicKey);
$keyData[] = $signingKey;
$keyData = array_combine(['x', 'y', 'd'], $keyData);
$keyData = array_map([Base64Url::class, 'encode'], $keyData);
// Get an in-memory key (see https://github.com/lcobucci/jwt/blob/3.4.x/docs/configuration.md)
$privateKeyPem = Encryption::convertPrivateKeyToPEM($keyData);
$publicKeyPem = Encryption::convertPublicKeyToPEM($keyData);
$signingKey = InMemory::plainText($privateKeyPem);
$verificationKey = InMemory::plainText($publicKeyPem);
// Calculate expiration date and time
$expirationLimit = time() + 43200; // equal margin of error between 0 and 24h
if (null === $expiration || $expiration > $expirationLimit)
{
$expiration = $expirationLimit;
}
// Get current data and time
// Get the JWT
$configuration = Configuration::forAsymmetricSigner(new Sha256(), $signingKey, $verificationKey);
$token = $configuration->builder()
->setAudience($audience)
->expiresAt(new DateTimeImmutable('@' . $expiration))
->setSubject($subject)
->issuedAt(new DateTimeImmutable())
->getToken($configuration->signer(), $configuration->signingKey());
$jwt = $token->toString();
// Get the authorisation headers
$encodedPublicKey = Base64Url::encode($publicKey);
if ($contentEncoding === "aesgcm")
{
return [
'Authorization' => 'WebPush ' . $jwt,
'Crypto-Key' => 'p256ecdsa=' . $encodedPublicKey,
];
}
if ($contentEncoding === 'aes128gcm')
{
return [
'Authorization' => 'vapid t=' . $jwt . ', k=' . $encodedPublicKey,
];
}
throw new \ErrorException('This content encoding is not supported');
}
/**
* @throws \ErrorException
*/
public static function validate(array $vapid): array
{
if (!isset($vapid['subject']))
{
throw new \ErrorException('[VAPID] You must provide a subject that is either a mailto: or a URL.');
}
if (!isset($vapid['publicKey']))
{
throw new \ErrorException('[VAPID] You must provide a public key.');
}
$publicKey = Base64Url::decode($vapid['publicKey']);
if (Utils::safeStrlen($publicKey) !== self::PUBLIC_KEY_LENGTH)
{
throw new \ErrorException('[VAPID] Public key should be 65 bytes long when decoded.');
}
if (!isset($vapid['privateKey']))
{
throw new \ErrorException('[VAPID] You must provide a private key.');
}
$privateKey = Base64Url::decode($vapid['privateKey']);
if (Utils::safeStrlen($privateKey) !== self::PRIVATE_KEY_LENGTH)
{
throw new \ErrorException('[VAPID] Private key should be 32 bytes long when decoded.');
}
return [
'subject' => $vapid['subject'],
'publicKey' => $publicKey,
'privateKey' => $privateKey,
];
}
/**
* Create a new elliptic curve key using the P-256 curve and OpenSSL
*
* @throws \RuntimeException if the extension OpenSSL is not available
* @throws \RuntimeException if the key cannot be created
*/
private static function createECKeyUsingOpenSSL(): array
{
if (!extension_loaded('openssl'))
{
throw new \RuntimeException('Please install the OpenSSL extension');
}
$key = openssl_pkey_new([
'curve_name' => 'prime256v1',
'private_key_type' => OPENSSL_KEYTYPE_EC,
]);
if ($key === false)
{
throw new \RuntimeException('Unable to create the key');
}
$result = openssl_pkey_export($key, $out);
if ($result === false)
{
throw new \RuntimeException('Unable to create the key');
}
$res = openssl_pkey_get_private($out);
if ($res === false)
{
throw new \RuntimeException('Unable to create the key');
}
$details = openssl_pkey_get_details($res);
if ($details === false)
{
throw new \InvalidArgumentException('Unable to get the key details');
}
return [
'd' => $details['ec']['d'],
'x' => $details['ec']['x'],
'y' => $details['ec']['y'],
];
}
}