|
| 1 | +# JWT Payload Extractor |
| 2 | + |
| 3 | + |
| 4 | + |
| 5 | +[](https://codecov.io/gh/php-istio/jwt-payload-extractor) |
| 6 | + |
| 7 | +## About |
| 8 | + |
| 9 | +This library help to extract trusted JWT payload from request forwarded by Istio Envoy proxy. It's based |
| 10 | +on [PSR-7 Server Request Message](https://www.php-fig.org/psr/psr-7/) ensures interoperability with other packages and |
| 11 | +frameworks. |
| 12 | + |
| 13 | + |
| 14 | + |
| 15 | +## Requirements |
| 16 | + |
| 17 | +PHP versions: |
| 18 | + |
| 19 | ++ PHP 8.0 |
| 20 | + |
| 21 | +## Installation |
| 22 | + |
| 23 | +First install this library: |
| 24 | + |
| 25 | +```shell |
| 26 | +composer require php-istio/jwt-payload-extractor |
| 27 | +``` |
| 28 | + |
| 29 | +And choice one of PSR-7 implementation package (ex: [nyholm/psr7-server](https://github.com/Nyholm/psr7-server/)): |
| 30 | + |
| 31 | +```shell |
| 32 | +composer require nyholm/psr7 nyholm/psr7-server |
| 33 | +``` |
| 34 | + |
| 35 | +## Usage |
| 36 | + |
| 37 | +Istio CRD [JWTRules](https://istio.io/latest/docs/reference/config/security/jwt/#JWTRule) support forward origin |
| 38 | +token (`forwardOriginalToken` option), or just only base64 payload via specify header name |
| 39 | +(`outputPayloadToHeader` option), depend on your strategy you need to select method to extract your trusted JWT payload from forwarded request: |
| 40 | + |
| 41 | ++ Extract from origin token in header: |
| 42 | + |
| 43 | +```php |
| 44 | +<?php |
| 45 | +$psr17Factory = new \Nyholm\Psr7\Factory\Psr17Factory(); |
| 46 | + |
| 47 | +$creator = new \Nyholm\Psr7Server\ServerRequestCreator( |
| 48 | + $psr17Factory, // ServerRequestFactory |
| 49 | + $psr17Factory, // UriFactory |
| 50 | + $psr17Factory, // UploadedFileFactory |
| 51 | + $psr17Factory // StreamFactory |
| 52 | +); |
| 53 | + |
| 54 | +$serverRequest = $creator->fromGlobals(); |
| 55 | +$extractor = \Istio\JWTPayloadExtractor\ExtractorFactory::fromOriginTokenHeader('issuer.example', 'authorization'); |
| 56 | +$payload = $extractor->extract($serverRequest); |
| 57 | + |
| 58 | +if(null !== $payload) { |
| 59 | + var_dump($payload); |
| 60 | +} |
| 61 | +``` |
| 62 | + |
| 63 | ++ Extract origin token in query param: |
| 64 | + |
| 65 | +```php |
| 66 | +<?php |
| 67 | +//...... |
| 68 | +$extractor = \Istio\JWTPayloadExtractor\ExtractorFactory::fromOriginTokenQueryParam('issuer.example', 'token'); |
| 69 | +$payload = $extractor->extract($serverRequest); |
| 70 | +//...... |
| 71 | +``` |
| 72 | + |
| 73 | ++ Extract base64 payload header: |
| 74 | + |
| 75 | +```php |
| 76 | +<?php |
| 77 | +//...... |
| 78 | +$extractor = \Istio\JWTPayloadExtractor\ExtractorFactory::fromBase64Header('issuer.example', 'x-istio-jwt-payload'); |
| 79 | +$payload = $extractor->extract($serverRequest); |
| 80 | +//...... |
| 81 | +``` |
| 82 | + |
| 83 | ++ In case your application have many JWT issuers, or many extraction strategies: |
| 84 | + |
| 85 | +```php |
| 86 | +<?php |
| 87 | +//...... |
| 88 | +$extractor = \Istio\JWTPayloadExtractor\ExtractorFactory::fromExtractors( |
| 89 | + \Istio\JWTPayloadExtractor\ExtractorFactory::fromBase64Header('issuer1.example', 'x-istio-jwt-payload'), |
| 90 | + \Istio\JWTPayloadExtractor\ExtractorFactory::fromOriginTokenQueryParam('issuer1.example', 'token'), |
| 91 | + \Istio\JWTPayloadExtractor\ExtractorFactory::fromOriginTokenHeader('issuer2.example', 'authorization'), |
| 92 | + \Istio\JWTPayloadExtractor\ExtractorFactory::fromOriginTokenQueryParam('issuer3.example', 'token'), |
| 93 | +); |
| 94 | +$payload = $extractor->extract($serverRequest); |
| 95 | +//...... |
| 96 | +``` |
| 97 | + |
| 98 | +## Testing |
| 99 | + |
| 100 | +This library uses [PHPUnit](https://phpunit.de) for unit tests: |
| 101 | + |
| 102 | +```shell |
| 103 | +vendor/bin/phpunit |
| 104 | +``` |
| 105 | + |
| 106 | +## Credits |
| 107 | + |
| 108 | ++ [Minh Vuong](https://github.com/vuongxuongminh) |
0 commit comments