1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
|
using System.Net.Http.Headers;
using System.Text;
using System.Text.Encodings.Web;
using Microsoft.Extensions.Options;
namespace IOL.GreatOffice.Api.Utilities;
public class BasicAuthenticationHandler : AuthenticationHandler<AuthenticationSchemeOptions>
{
private readonly MainAppDatabase _context;
private readonly ILogger<BasicAuthenticationHandler> _logger;
public BasicAuthenticationHandler(
IOptionsMonitor<AuthenticationSchemeOptions> options,
ILoggerFactory logger,
UrlEncoder encoder,
MainAppDatabase context
) :
base(options, logger, encoder)
{
_context = context;
_logger = logger.CreateLogger<BasicAuthenticationHandler>();
}
protected override Task<AuthenticateResult> HandleAuthenticateAsync()
{
var endpoint = Context.GetEndpoint();
if (endpoint?.Metadata.GetMetadata<IAllowAnonymous>() != null)
return Task.FromResult(AuthenticateResult.NoResult());
if (!Request.Headers.ContainsKey("Authorization"))
return Task.FromResult(AuthenticateResult.Fail("Missing Authorization Header"));
try
{
var tokenEntropy = Program.AppConfiguration.APP_AES_KEY;
if (tokenEntropy.IsNullOrWhiteSpace())
{
_logger.LogWarning("No token entropy is available in env:TOKEN_ENTROPY, Basic auth is disabled");
return Task.FromResult(AuthenticateResult.Fail("Invalid Authorization Header"));
}
var authHeader = AuthenticationHeaderValue.Parse(Request.Headers["Authorization"]);
if (authHeader.Parameter == null) return Task.FromResult(AuthenticateResult.Fail("Invalid Authorization Header"));
var credentialBytes = Convert.FromBase64String(authHeader.Parameter);
var decryptedString = Encoding.UTF8.GetString(credentialBytes).DecryptWithAes(tokenEntropy);
var tokenIsGuid = Guid.TryParse(decryptedString, out var tokenId);
if (!tokenIsGuid)
{
return Task.FromResult(AuthenticateResult.Fail("Invalid Authorization Header"));
}
var token = _context.AccessTokens.Include(c => c.User).SingleOrDefault(c => c.Id == tokenId);
if (token == default)
{
return Task.FromResult(AuthenticateResult.Fail("Invalid Authorization Header: Not Found"));
}
if (token.HasExpired)
{
return Task.FromResult(AuthenticateResult.Fail("Invalid Authorization Header: Expired"));
}
var permissions = new List<Claim>() {
new(AppConstants.TOKEN_ALLOW_READ, token.AllowRead.ToString()),
new(AppConstants.TOKEN_ALLOW_UPDATE, token.AllowUpdate.ToString()),
new(AppConstants.TOKEN_ALLOW_CREATE, token.AllowCreate.ToString()),
new(AppConstants.TOKEN_ALLOW_DELETE, token.AllowDelete.ToString()),
};
var claims = token.User.DefaultClaims().Concat(permissions);
var identity = new ClaimsIdentity(claims, AppConstants.BASIC_AUTH_SCHEME);
var principal = new ClaimsPrincipal(identity);
var ticket = new AuthenticationTicket(principal, AppConstants.BASIC_AUTH_SCHEME);
return Task.FromResult(AuthenticateResult.Success(ticket));
}
catch (Exception e)
{
_logger.LogError(e, $"An exception occured when challenging {AppConstants.BASIC_AUTH_SCHEME}");
return Task.FromResult(AuthenticateResult.Fail("Invalid Authorization Header"));
}
}
}
|