delphimvcframework/sources/MVCFramework.Middleware.JWT.pas

555 lines
19 KiB
ObjectPascal
Raw Normal View History

// ***************************************************************************
//
// Delphi MVC Framework
//
2022-01-04 15:44:47 +01:00
// Copyright (c) 2010-2022 Daniele Teti and the DMVCFramework Team
//
// https://github.com/danieleteti/delphimvcframework
//
// ***************************************************************************
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// *************************************************************************** }
unit MVCFramework.Middleware.JWT;
{$I dmvcframework.inc}
interface
uses
System.SysUtils,
System.Classes,
System.Generics.Collections,
MVCFramework,
MVCFramework.Commons,
MVCFramework.JWT,
2022-09-15 09:09:33 +02:00
JsonDataObjects,
MVCFramework.HMAC;
type
TMVCJWTDefaults = class sealed
public const
/// <summary>
/// Default authorization header name (RFC 6750)
/// </summary>
AUTHORIZATION_HEADER = 'Authorization';
/// <summary>
/// Default username header name
/// </summary>
USERNAME_HEADER = 'jwtusername';
/// <summary>
/// Default password header name
/// </summary>
PASSWORD_HEADER = 'jwtpassword';
2021-08-14 00:48:37 +02:00
/// <summary>
/// Default AUTH schema
/// </summary>
AUTH_SCHEMA = 'Bearer';
end;
2017-03-20 19:08:01 +01:00
TJWTClaimsSetup = reference to procedure(const JWT: TJWT);
TMVCJWTAuthenticationMiddleware = class(TInterfacedObject, IMVCMiddleware)
private
FAuthenticationHandler: IMVCAuthenticationHandler;
FClaimsToChecks: TJWTCheckableClaims;
FSetupJWTClaims: TJWTClaimsSetup;
FSecret: string;
FLeewaySeconds: Cardinal;
FLoginURLSegment: string;
FAuthorizationHeaderName: string;
FUserNameHeaderName: string;
FPasswordHeaderName: string;
2022-09-15 09:09:33 +02:00
FHMACAlgorithm: String;
protected
function NeedsToBeExtended(const JWTValue: TJWT): Boolean;
procedure ExtendExpirationTime(const JWTValue: TJWT);
2019-09-25 14:54:02 +02:00
procedure InternalRender(AJSONOb: TJDOJsonObject; AContentType: string; AContentEncoding: string;
AContext: TWebContext; AInstanceOwner: Boolean = True); virtual;
procedure OnBeforeRouting(AContext: TWebContext; var AHandled: Boolean); virtual;
procedure OnBeforeControllerAction(AContext: TWebContext; const AControllerQualifiedClassName: string;
const AActionName: string; var AHandled: Boolean); virtual;
procedure OnAfterControllerAction(AContext: TWebContext;
const AControllerQualifiedClassName: string; const AActionName: string;
const AHandled: Boolean); virtual;
procedure OnAfterRouting(AContext: TWebContext; const AHandled: Boolean); virtual;
public
constructor Create(AAuthenticationHandler: IMVCAuthenticationHandler;
AConfigClaims: TJWTClaimsSetup;
ASecret: string = 'D3lph1MVCFram3w0rk';
ALoginURLSegment: string = '/login';
2022-09-15 09:09:33 +02:00
AClaimsToCheck: TJWTCheckableClaims = [];
ALeewaySeconds: Cardinal = 300;
AHMACAlgorithm: String = HMAC_HS512); overload; virtual;
property AuthorizationHeaderName: string read FAuthorizationHeaderName;
property UserNameHeaderName: string read FUserNameHeaderName;
property PasswordHeaderName: string read FPasswordHeaderName;
end;
TMVCOnAcceptTokenProc = reference to procedure(AContext: TWebContext; AJWTToken: String;
var AAccepted: Boolean);
TMVCOnNewJWTToBlackList = reference to procedure(AContext: TWebContext; AJWTToken: String);
TMVCJWTBlackListMiddleware = class(TInterfacedObject, IMVCMiddleware)
private
fOnAcceptToken: TMVCOnAcceptTokenProc;
fOnNewJWTToBlackList: TMVCOnNewJWTToBlackList;
fBlackListRequestURLSegment: string;
protected
procedure OnBeforeRouting(
AContext: TWebContext;
var AHandled: Boolean
);
procedure OnBeforeControllerAction(
AContext: TWebContext;
const AControllerQualifiedClassName: string;
const AActionName: string;
var AHandled: Boolean
);
procedure OnAfterControllerAction(
AContext: TWebContext;
const AControllerQualifiedClassName: string; const AActionName: string;
const AHandled: Boolean);
procedure OnAfterRouting(
AContext: TWebContext;
const AHandled: Boolean
);
public
constructor Create(
OnAcceptToken: TMVCOnAcceptTokenProc;
OnNewJWTToBlackList: TMVCOnNewJWTToBlackList;
BlackListRequestURLSegment: string = '/logout');
end;
implementation
uses
System.NetEncoding,
System.DateUtils,
System.Math,
MVCFramework.Logger;
{ TMVCJWTAuthenticationMiddleware }
constructor TMVCJWTAuthenticationMiddleware.Create(
AAuthenticationHandler: IMVCAuthenticationHandler;
AConfigClaims: TJWTClaimsSetup;
ASecret, ALoginURLSegment: string;
AClaimsToCheck: TJWTCheckableClaims;
2022-09-15 09:09:33 +02:00
ALeewaySeconds: Cardinal;
AHMACAlgorithm: String
);
2019-07-26 13:51:11 +02:00
begin
inherited Create;
FAuthenticationHandler := AAuthenticationHandler;
FSetupJWTClaims := AConfigClaims;
FClaimsToChecks := AClaimsToCheck;
FSecret := ASecret;
FLoginURLSegment := ALoginURLSegment;
FLeewaySeconds := ALeewaySeconds;
FAuthorizationHeaderName := TMVCJWTDefaults.AUTHORIZATION_HEADER;
FUserNameHeaderName := TMVCJWTDefaults.USERNAME_HEADER;
FPasswordHeaderName := TMVCJWTDefaults.PASSWORD_HEADER;
2022-09-15 09:09:33 +02:00
FHMACAlgorithm := AHMACAlgorithm;
2019-07-26 13:51:11 +02:00
end;
procedure TMVCJWTAuthenticationMiddleware.ExtendExpirationTime(const JWTValue: TJWT);
begin
JWTValue.Claims.ExpirationTime := Max(JWTValue.Claims.ExpirationTime, Now) +
(JWTValue.LeewaySeconds + JWTValue.LiveValidityWindowInSeconds) * OneSecond;
end;
procedure TMVCJWTAuthenticationMiddleware.InternalRender(AJSONOb: TJDOJsonObject;
AContentType, AContentEncoding: string; AContext: TWebContext; AInstanceOwner: Boolean);
2017-03-20 19:08:01 +01:00
var
Encoding: TEncoding;
ContentType, JValue: string;
2017-03-20 19:08:01 +01:00
begin
JValue := AJSONOb.ToJSON;
2017-03-20 19:08:01 +01:00
AContext.Response.RawWebResponse.ContentType := AContentType + '; charset=' + AContentEncoding;
ContentType := AContentType + '; charset=' + AContentEncoding;
Encoding := TEncoding.GetEncoding(AContentEncoding);
2017-03-20 19:08:01 +01:00
try
AContext.Response.SetContentStream(TBytesStream.Create(TEncoding.Convert(TEncoding.Default, Encoding,
TEncoding.Default.GetBytes(JValue))), ContentType);
2017-03-20 19:08:01 +01:00
finally
Encoding.Free;
2017-03-20 19:08:01 +01:00
end;
if AInstanceOwner then
FreeAndNil(AJSONOb)
2017-03-20 19:08:01 +01:00
end;
function TMVCJWTAuthenticationMiddleware.NeedsToBeExtended(const JWTValue: TJWT): Boolean;
var
lWillExpireIn: Int64;
begin
lWillExpireIn := SecondsBetween(Now, JWTValue.Claims.ExpirationTime);
Result := lWillExpireIn <= JWTValue.LiveValidityWindowInSeconds;
end;
procedure TMVCJWTAuthenticationMiddleware.OnAfterControllerAction(AContext: TWebContext;
const AControllerQualifiedClassName: string; const AActionName: string;
const AHandled: Boolean);
begin
// Implement as needed
end;
procedure TMVCJWTAuthenticationMiddleware.OnAfterRouting(AContext: TWebContext; const AHandled: Boolean);
begin
// Implement as needed
end;
procedure TMVCJWTAuthenticationMiddleware.OnBeforeControllerAction(AContext: TWebContext;
const AControllerQualifiedClassName, AActionName: string; var AHandled: Boolean);
var
AuthRequired: Boolean;
IsAuthorized: Boolean;
JWTValue: TJWT;
AuthHeader: string;
AuthToken: string;
ErrorMsg: string;
begin
// check if the resource is protected
2019-07-26 13:51:11 +02:00
if Assigned(FAuthenticationHandler) then
begin
2019-07-26 13:51:11 +02:00
FAuthenticationHandler.OnRequest(AContext, AControllerQualifiedClassName, AActionName, AuthRequired);
if not AuthRequired then
begin
AHandled := False;
{ this section handles the case when the authenticated user (with a token) need to call an action which doesn't require
authentication. To make Context.LoggerdUser.IsValid works we need to load the JWT if present. In such way
the "public" action can distriminate is has been called by a not-authnticated user or an authenticated user.
If there isn't a token, we don't have to raise exceptions, just make sure that the LoggedUser doesn't contain
information.
}
AuthHeader := AContext.Request.Headers[FAuthorizationHeaderName];
if not AuthHeader.IsEmpty then
begin
{ load and verify token even for an action that doesn't require it }
JWTValue := TJWT.Create(FSecret, FLeewaySeconds);
try
JWTValue.RegClaimsToChecks := Self.FClaimsToChecks;
// retrieve the token from the "authentication Bearer" header
AuthToken := '';
2021-08-14 00:48:37 +02:00
if AuthHeader.Substring(0, TMVCJWTDefaults.AUTH_SCHEMA.Length).ToLower = 'bearer' then
begin
2021-08-14 00:48:37 +02:00
AuthToken := AuthHeader.Remove(0, TMVCJWTDefaults.AUTH_SCHEMA.Length).Trim;
AuthToken := Trim(TNetEncoding.URL.Decode(AuthToken));
end;
if JWTValue.LoadToken(AuthToken, ErrorMsg) then
begin
{ load token info only if the token is still valid }
AContext.LoggedUser.UserName := JWTValue.CustomClaims['username'];
AContext.LoggedUser.Roles.AddRange(JWTValue.CustomClaims['roles'].Split([',']));
AContext.LoggedUser.LoggedSince := JWTValue.Claims.IssuedAt;
AContext.LoggedUser.CustomData := JWTValue.CustomClaims.AsCustomData;
end;
finally
JWTValue.Free;
end;
end;
2019-07-26 13:51:11 +02:00
Exit;
end;
end;
// Checking token in subsequent requests
// ***************************************************
JWTValue := TJWT.Create(FSecret, FLeewaySeconds);
try
JWTValue.RegClaimsToChecks := Self.FClaimsToChecks;
AuthHeader := AContext.Request.Headers[FAuthorizationHeaderName];
if AuthHeader.IsEmpty then
raise EMVCJWTException.Create(HTTP_STATUS.Unauthorized, 'Authorization Required');
// retrieve the token from the "authentication Bearer" header
AuthToken := '';
2021-08-14 00:48:37 +02:00
if AuthHeader.Substring(0, TMVCJWTDefaults.AUTH_SCHEMA.Length).ToLower = 'bearer' then
begin
2021-08-14 00:48:37 +02:00
AuthToken := AuthHeader.Remove(0, TMVCJWTDefaults.AUTH_SCHEMA.Length).Trim;
AuthToken := Trim(TNetEncoding.URL.Decode(AuthToken));
end;
2017-09-22 09:33:21 +02:00
if not JWTValue.LoadToken(AuthToken, ErrorMsg) then
raise EMVCJWTException.Create(HTTP_STATUS.Unauthorized, ErrorMsg);
2017-09-22 09:33:21 +02:00
if JWTValue.CustomClaims['username'].IsEmpty then
raise EMVCJWTException.Create(HTTP_STATUS.Unauthorized, 'Invalid Token, Authorization Required');
2019-07-26 13:51:11 +02:00
AContext.LoggedUser.UserName := JWTValue.CustomClaims['username'];
AContext.LoggedUser.Roles.AddRange(JWTValue.CustomClaims['roles'].Split([',']));
AContext.LoggedUser.LoggedSince := JWTValue.Claims.IssuedAt;
AContext.LoggedUser.CustomData := JWTValue.CustomClaims.AsCustomData;
2019-07-26 13:51:11 +02:00
if Assigned(FAuthenticationHandler) then
begin
FAuthenticationHandler.OnAuthorization(AContext, AContext.LoggedUser.Roles, AControllerQualifiedClassName,
AActionName, IsAuthorized);
2019-07-26 13:51:11 +02:00
if not IsAuthorized then
raise EMVCJWTException.Create(HTTP_STATUS.Forbidden, 'Authorization Forbidden');
2019-07-26 13:51:11 +02:00
end;
if JWTValue.LiveValidityWindowInSeconds > 0 then
begin
if NeedsToBeExtended(JWTValue) then
begin
ExtendExpirationTime(JWTValue);
AContext.Response.SetCustomHeader(FAuthorizationHeaderName, 'Bearer ' + JWTValue.GetToken);
end;
end;
2019-07-26 13:51:11 +02:00
AHandled := False;
finally
JWTValue.Free;
end;
end;
procedure TMVCJWTAuthenticationMiddleware.OnBeforeRouting(AContext: TWebContext; var AHandled: Boolean);
var
LUsername: string;
LPassword: string;
LBasicAuthHeader: string;
LBasicAuthParts: TArray<string>;
LRolesList: TList<string>;
LSessionData: TSessionData;
LIsValid: Boolean;
LJWTValue: TJWT;
LCustomPair: TPair<string, string>;
LJsonObject: TJDOJsonObject;
2019-09-25 14:54:02 +02:00
lJObj: TJsonObject;
begin
if SameText(AContext.Request.PathInfo, FLoginURLSegment) then
begin
LBasicAuthHeader := AContext.Request.Headers[FAuthorizationHeaderName];
if LBasicAuthHeader.IsEmpty then
begin
2019-09-25 14:54:02 +02:00
// read from headers
LUsername := TNetEncoding.URL.Decode(AContext.Request.Headers[FUserNameHeaderName]);
LPassword := TNetEncoding.URL.Decode(AContext.Request.Headers[FPasswordHeaderName]);
2019-09-25 14:54:02 +02:00
// read from content
if LUsername.IsEmpty then
begin
LUsername := AContext.Request.ContentParam(FUserNameHeaderName);
LPassword := AContext.Request.ContentParam(FPasswordHeaderName);
2019-09-25 14:54:02 +02:00
end;
// read from json content
if LUsername.IsEmpty then
begin
lJObj := nil;
try
lJObj := TJsonBaseObject.Parse(AContext.Request.Body) as TJsonObject;
except
end;
try
if Assigned(lJObj) then
begin
LUsername := lJObj.S[FUserNameHeaderName];
LPassword := lJObj.S[FPasswordHeaderName];
end;
finally
lJObj.Free;
end;
end;
if (LUsername.IsEmpty) or (LPassword.IsEmpty) then
raise EMVCJWTException.Create(HTTP_STATUS.Unauthorized, 'Username and password required');
end
else
begin
if not LBasicAuthHeader.StartsWith('basic', True) then
raise EMVCJWTException.Create(HTTP_STATUS.Unauthorized, 'Invalid authorization type');
LBasicAuthHeader := LBasicAuthHeader.Remove(0, 'basic'.Length).Trim;
LBasicAuthParts := TBase64Encoding.Base64.Decode(LBasicAuthHeader).Split([':']);
if Length(LBasicAuthParts) <> 2 then
raise EMVCJWTException.Create(HTTP_STATUS.Unauthorized, 'Invalid authorization type');
2019-09-25 14:54:02 +02:00
LUsername := LBasicAuthParts[0];
LPassword := LBasicAuthParts[1];
end;
// check the authorization for the requested resource
LRolesList := TList<string>.Create;
try
LSessionData := TSessionData.Create;
try
if Assigned(FAuthenticationHandler) then
begin
FAuthenticationHandler.OnAuthentication(AContext, LUsername, LPassword, LRolesList, LIsValid, LSessionData);
if not LIsValid then
raise EMVCJWTException.Create(HTTP_STATUS.Forbidden, 'Forbidden');
end;
2019-07-26 13:51:11 +02:00
LJWTValue := TJWT.Create(FSecret, FLeewaySeconds);
try
// let's user config claims and custom claims
if not Assigned(FSetupJWTClaims) then
raise EMVCJWTException.Create('SetupJWTClaims not set');
LJWTValue.Data := AContext.Request;
FSetupJWTClaims(LJWTValue);
// these claims are mandatory and managed by the middleware
if not LJWTValue.CustomClaims['username'].IsEmpty then
2019-09-25 14:54:02 +02:00
raise EMVCJWTException.Create
('Custom claim "username" is reserved and cannot be modified in the JWT setup');
if not LJWTValue.CustomClaims['roles'].IsEmpty then
raise EMVCJWTException.Create('Custom claim "roles" is reserved and cannot be modified in the JWT setup');
LJWTValue.CustomClaims['username'] := LUsername;
LJWTValue.CustomClaims['roles'] := string.Join(',', LRolesList.ToArray);
if LJWTValue.LiveValidityWindowInSeconds > 0 then
if NeedsToBeExtended(LJWTValue) then
ExtendExpirationTime(LJWTValue);
// setup the current logged user from the JWT
AContext.LoggedUser.Roles.AddRange(LRolesList);
AContext.LoggedUser.UserName := LJWTValue.CustomClaims['username'];
AContext.LoggedUser.LoggedSince := LJWTValue.Claims.IssuedAt;
AContext.LoggedUser.Realm := LJWTValue.Claims.Subject;
if LSessionData.Count > 0 then
begin
AContext.LoggedUser.CustomData := TMVCCustomData.Create;
for LCustomPair in LSessionData do
2019-07-26 13:51:11 +02:00
begin
AContext.LoggedUser.CustomData.AddOrSetValue(LCustomPair.Key, LCustomPair.Value);
if not LJWTValue.CustomClaims.Items[LCustomPair.Key].IsEmpty then
raise EMVCJWTException.CreateFmt('JWT Error: "%s" is a reserved key name', [LCustomPair.Key]);
LJWTValue.CustomClaims.Items[LCustomPair.Key] := LCustomPair.Value;
2019-07-26 13:51:11 +02:00
end;
end;
LJsonObject := TJDOJsonObject.Create;
try
LJsonObject.S['token'] := LJWTValue.GetToken;
2019-09-25 14:54:02 +02:00
InternalRender(LJsonObject, TMVCMediaType.APPLICATION_JSON, TMVCConstants.DEFAULT_CONTENT_CHARSET,
AContext, False);
2019-07-26 13:51:11 +02:00
finally
LJsonObject.Free;
end;
AHandled := True;
finally
LJWTValue.Free;
end;
finally
LSessionData.Free;
end;
finally
LRolesList.Free;
end;
end;
end;
constructor TMVCJWTBlackListMiddleware.Create(
OnAcceptToken: TMVCOnAcceptTokenProc;
OnNewJWTToBlackList: TMVCOnNewJWTToBlackList;
BlackListRequestURLSegment: string = '/logout');
begin
inherited Create;
fOnAcceptToken := OnAcceptToken;
fOnNewJWTToBlackList := OnNewJWTToBlackList;
fBlackListRequestURLSegment := BlackListRequestURLSegment;
Assert(Assigned(fOnAcceptToken));
Assert(not fBlackListRequestURLSegment.IsEmpty);
end;
procedure TMVCJWTBlackListMiddleware.OnAfterControllerAction(
AContext: TWebContext;
const AControllerQualifiedClassName: string; const AActionName: string;
const AHandled: Boolean);
begin
// Implement as needed
end;
procedure TMVCJWTBlackListMiddleware.OnAfterRouting(AContext: TWebContext; const AHandled: Boolean);
begin
// Implement as needed
end;
procedure TMVCJWTBlackListMiddleware.OnBeforeControllerAction(
AContext: TWebContext; const AControllerQualifiedClassName,
AActionName: string; var AHandled: Boolean);
begin
// Implement as needed
end;
procedure TMVCJWTBlackListMiddleware.OnBeforeRouting(AContext: TWebContext; var AHandled: Boolean);
var
lAuthHeader: string;
lAuthToken: string;
lAccepted: Boolean;
begin
lAuthToken := '';
lAuthHeader := AContext.Request.Headers[TMVCJWTDefaults.AUTHORIZATION_HEADER];
if not lAuthHeader.IsEmpty then
begin
// retrieve the token from the "authentication Bearer" header
if lAuthHeader.Substring(0, TMVCJWTDefaults.AUTH_SCHEMA.Length).ToLower = 'bearer' then
begin
lAuthToken := lAuthHeader.Remove(0, TMVCJWTDefaults.AUTH_SCHEMA.Length).Trim;
lAuthToken := Trim(TNetEncoding.URL.Decode(lAuthToken));
end;
end;
if SameText(AContext.Request.PathInfo, fBlackListRequestURLSegment) then
begin
// add the token in the blacklist
if lAuthToken.IsEmpty then
begin
raise EMVCException.Create(HTTP_STATUS.BadRequest,
'JWTToken required - cannot blacklist an unknown token');
end;
fOnNewJWTToBlackList(AContext, lAuthToken);
AContext.Response.StatusCode := HTTP_STATUS.NoContent;
AHandled := True;
end
else
begin
// just check if token is blacklisted.
// if the token is not available, just ignore the check
// remember, here jwtmiddleware already did its job.
if lAuthToken.IsEmpty then
begin
AHandled := False;
end
else
begin
lAccepted := True;
fOnAcceptToken(AContext, lAuthToken, lAccepted);
if not lAccepted then
begin
raise EMVCJWTException.Create(HTTP_STATUS.Forbidden, 'JWT not accepted');
end;
end;
end;
end;
end.