You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
117 lines
6.4 KiB
117 lines
6.4 KiB
/*
|
|
* Licensed under the Apache License, Version 2.0 (http://www.apache.org/licenses/LICENSE-2.0)
|
|
* See https://github.com/openiddict/openiddict-core for more information concerning
|
|
* the license and the contributors participating to this project.
|
|
*/
|
|
|
|
using System.Collections.Immutable;
|
|
using System.Diagnostics;
|
|
using System.Net.Http.Headers;
|
|
using System.Text;
|
|
|
|
namespace OpenIddict.Validation.SystemNetHttp;
|
|
|
|
public static partial class OpenIddictValidationSystemNetHttpHandlers
|
|
{
|
|
public static class Introspection
|
|
{
|
|
public static ImmutableArray<OpenIddictValidationHandlerDescriptor> DefaultHandlers { get; } = ImmutableArray.Create(
|
|
/*
|
|
* Introspection request processing:
|
|
*/
|
|
PreparePostHttpRequest<PrepareIntrospectionRequestContext>.Descriptor,
|
|
AttachJsonAcceptHeaders<PrepareIntrospectionRequestContext>.Descriptor,
|
|
AttachUserAgentHeader<PrepareIntrospectionRequestContext>.Descriptor,
|
|
AttachBasicAuthenticationCredentials.Descriptor,
|
|
AttachFormParameters<PrepareIntrospectionRequestContext>.Descriptor,
|
|
SendHttpRequest<ApplyIntrospectionRequestContext>.Descriptor,
|
|
DisposeHttpRequest<ApplyIntrospectionRequestContext>.Descriptor,
|
|
|
|
/*
|
|
* Introspection response processing:
|
|
*/
|
|
DecompressResponseContent<ExtractIntrospectionResponseContext>.Descriptor,
|
|
ExtractJsonHttpResponse<ExtractIntrospectionResponseContext>.Descriptor,
|
|
ExtractWwwAuthenticateHeader<ExtractIntrospectionResponseContext>.Descriptor,
|
|
ValidateHttpResponse<ExtractIntrospectionResponseContext>.Descriptor,
|
|
DisposeHttpResponse<ExtractIntrospectionResponseContext>.Descriptor);
|
|
|
|
/// <summary>
|
|
/// Contains the logic responsible for attaching the client credentials to the HTTP Authorization header.
|
|
/// </summary>
|
|
public class AttachBasicAuthenticationCredentials : IOpenIddictValidationHandler<PrepareIntrospectionRequestContext>
|
|
{
|
|
/// <summary>
|
|
/// Gets the default descriptor definition assigned to this handler.
|
|
/// </summary>
|
|
public static OpenIddictValidationHandlerDescriptor Descriptor { get; }
|
|
= OpenIddictValidationHandlerDescriptor.CreateBuilder<PrepareIntrospectionRequestContext>()
|
|
.AddFilter<RequireHttpMetadataAddress>()
|
|
.UseSingletonHandler<AttachBasicAuthenticationCredentials>()
|
|
.SetOrder(AttachFormParameters<PrepareIntrospectionRequestContext>.Descriptor.Order - 500)
|
|
.SetType(OpenIddictValidationHandlerType.BuiltIn)
|
|
.Build();
|
|
|
|
/// <inheritdoc/>
|
|
public async ValueTask HandleAsync(PrepareIntrospectionRequestContext context)
|
|
{
|
|
if (context is null)
|
|
{
|
|
throw new ArgumentNullException(nameof(context));
|
|
}
|
|
|
|
Debug.Assert(context.Request is not null, SR.GetResourceString(SR.ID4008));
|
|
|
|
// This handler only applies to System.Net.Http requests. If the HTTP request cannot be resolved,
|
|
// this may indicate that the request was incorrectly processed by another client stack.
|
|
var request = context.Transaction.GetHttpRequestMessage() ??
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0173));
|
|
|
|
// If no client identifier was attached to the request, skip the following logic.
|
|
if (string.IsNullOrEmpty(context.Request.ClientId))
|
|
{
|
|
return;
|
|
}
|
|
|
|
var configuration = await context.Options.ConfigurationManager.GetConfigurationAsync(default) ??
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0140));
|
|
|
|
// Ensure the issuer resolved from the configuration matches the expected value.
|
|
if (context.Options.Issuer is not null && configuration.Issuer != context.Options.Issuer)
|
|
{
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0307));
|
|
}
|
|
|
|
// The OAuth 2.0 specification recommends sending the client credentials using basic authentication.
|
|
// However, this authentication method is known to have compatibility issues with the way the
|
|
// client credentials are encoded (they MUST be formURL-encoded before being base64-encoded).
|
|
// To guarantee that the OpenIddict validation handler can be used with servers implementing
|
|
// non-standard encoding, the client_secret_post is always preferred when it's explicitly
|
|
// listed as a supported client authentication method for the introspection endpoint.
|
|
// If client_secret_post is not listed or if the server returned an empty methods list,
|
|
// client_secret_basic is always used, as it MUST be implemented by all OAuth 2.0 servers.
|
|
//
|
|
// See https://tools.ietf.org/html/rfc8414#section-2
|
|
// and https://tools.ietf.org/html/rfc6749#section-2.3.1 for more information.
|
|
if (!configuration.IntrospectionEndpointAuthMethodsSupported.Contains(ClientAuthenticationMethods.ClientSecretPost))
|
|
{
|
|
// Important: the credentials MUST be formURL-encoded before being base64-encoded.
|
|
var credentials = Convert.ToBase64String(Encoding.ASCII.GetBytes(new StringBuilder()
|
|
.Append(EscapeDataString(context.Request.ClientId))
|
|
.Append(':')
|
|
.Append(EscapeDataString(context.Request.ClientSecret))
|
|
.ToString()));
|
|
|
|
// Attach the authorization header containing the client credentials to the HTTP request.
|
|
request.Headers.Authorization = new AuthenticationHeaderValue(Schemes.Basic, credentials);
|
|
|
|
// Remove the client credentials from the request payload to ensure they are not sent twice.
|
|
context.Request.ClientId = context.Request.ClientSecret = null;
|
|
}
|
|
|
|
static string? EscapeDataString(string? value)
|
|
=> value is not null ? Uri.EscapeDataString(value).Replace("%20", "+") : null;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|