You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
733 lines
32 KiB
733 lines
32 KiB
/*
|
|
* Licensed under the Apache License, Version 2.0 (http://www.apache.org/licenses/LICENSE-2.0)
|
|
* See https://github.com/openiddict/openiddict-core for more information concerning
|
|
* the license and the contributors participating to this project.
|
|
*/
|
|
|
|
using System.ComponentModel;
|
|
using System.Diagnostics.CodeAnalysis;
|
|
using System.Reflection;
|
|
using System.Security.Claims;
|
|
using System.Security.Cryptography.X509Certificates;
|
|
using Microsoft.Extensions.DependencyInjection.Extensions;
|
|
using Microsoft.IdentityModel.Tokens;
|
|
using OpenIddict.Validation;
|
|
|
|
namespace Microsoft.Extensions.DependencyInjection;
|
|
|
|
/// <summary>
|
|
/// Exposes the necessary methods required to configure the OpenIddict validation services.
|
|
/// </summary>
|
|
public sealed class OpenIddictValidationBuilder
|
|
{
|
|
/// <summary>
|
|
/// Initializes a new instance of <see cref="OpenIddictValidationBuilder"/>.
|
|
/// </summary>
|
|
/// <param name="services">The services collection.</param>
|
|
public OpenIddictValidationBuilder(IServiceCollection services)
|
|
=> Services = services ?? throw new ArgumentNullException(nameof(services));
|
|
|
|
/// <summary>
|
|
/// Gets the services collection.
|
|
/// </summary>
|
|
[EditorBrowsable(EditorBrowsableState.Never)]
|
|
public IServiceCollection Services { get; }
|
|
|
|
/// <summary>
|
|
/// Registers an event handler using the specified configuration delegate.
|
|
/// </summary>
|
|
/// <typeparam name="TContext">The event context type.</typeparam>
|
|
/// <param name="configuration">The configuration delegate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
[EditorBrowsable(EditorBrowsableState.Advanced)]
|
|
public OpenIddictValidationBuilder AddEventHandler<TContext>(
|
|
Action<OpenIddictValidationHandlerDescriptor.Builder<TContext>> configuration)
|
|
where TContext : BaseContext
|
|
{
|
|
ArgumentNullException.ThrowIfNull(configuration);
|
|
|
|
// Note: handlers registered using this API are assumed to be custom handlers by default.
|
|
var builder = OpenIddictValidationHandlerDescriptor.CreateBuilder<TContext>()
|
|
.SetType(OpenIddictValidationHandlerType.Custom);
|
|
|
|
configuration(builder);
|
|
|
|
return AddEventHandler(builder.Build());
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers an event handler using the specified descriptor.
|
|
/// </summary>
|
|
/// <param name="descriptor">The handler descriptor.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
[EditorBrowsable(EditorBrowsableState.Advanced)]
|
|
public OpenIddictValidationBuilder AddEventHandler(OpenIddictValidationHandlerDescriptor descriptor)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(descriptor);
|
|
|
|
// Register the handler in the services collection.
|
|
Services.Add(descriptor.ServiceDescriptor);
|
|
|
|
return Configure(options => options.Handlers.Add(descriptor));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Removes the event handler that matches the specified descriptor.
|
|
/// </summary>
|
|
/// <param name="descriptor">The descriptor corresponding to the handler to remove.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
[EditorBrowsable(EditorBrowsableState.Advanced)]
|
|
public OpenIddictValidationBuilder RemoveEventHandler(OpenIddictValidationHandlerDescriptor descriptor)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(descriptor);
|
|
|
|
Services.RemoveAll(descriptor.ServiceDescriptor.ServiceType);
|
|
|
|
Services.PostConfigure<OpenIddictValidationOptions>(options =>
|
|
{
|
|
for (var index = options.Handlers.Count - 1; index >= 0; index--)
|
|
{
|
|
if (options.Handlers[index].ServiceDescriptor.ServiceType == descriptor.ServiceDescriptor.ServiceType)
|
|
{
|
|
options.Handlers.RemoveAt(index);
|
|
}
|
|
}
|
|
});
|
|
|
|
return this;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Amends the default OpenIddict validation configuration.
|
|
/// </summary>
|
|
/// <param name="configuration">The delegate used to configure the OpenIddict options.</param>
|
|
/// <remarks>This extension can be safely called multiple times.</remarks>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder Configure(Action<OpenIddictValidationOptions> configuration)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(configuration);
|
|
|
|
Services.Configure(configuration);
|
|
|
|
return this;
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers encryption credentials.
|
|
/// </summary>
|
|
/// <param name="credentials">The encrypting credentials.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCredentials(EncryptingCredentials credentials)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(credentials);
|
|
|
|
return Configure(options => options.EncryptionCredentials.Add(credentials));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers an encryption key.
|
|
/// </summary>
|
|
/// <param name="key">The security key.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionKey(SecurityKey key)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(key);
|
|
|
|
// If the encryption key is an asymmetric security key, ensure it has a private key.
|
|
if (key is AsymmetricSecurityKey { PrivateKeyStatus: PrivateKeyStatus.DoesNotExist })
|
|
{
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0055));
|
|
}
|
|
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.Aes256KW))
|
|
{
|
|
return AddEncryptionCredentials(new EncryptingCredentials(key,
|
|
SecurityAlgorithms.Aes256KW, SecurityAlgorithms.Aes256CbcHmacSha512));
|
|
}
|
|
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.RsaOAEP))
|
|
{
|
|
return AddEncryptionCredentials(new EncryptingCredentials(key,
|
|
SecurityAlgorithms.RsaOAEP, SecurityAlgorithms.Aes256CbcHmacSha512));
|
|
}
|
|
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0056));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers multiple encryption keys.
|
|
/// </summary>
|
|
/// <param name="keys">The security keys.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionKeys(IEnumerable<SecurityKey> keys)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(keys);
|
|
|
|
return keys.Aggregate(this, static (builder, key) => builder.AddEncryptionKey(key));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers an encryption certificate.
|
|
/// </summary>
|
|
/// <param name="certificate">The encryption certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificate(X509Certificate2 certificate)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(certificate);
|
|
|
|
// If the certificate is a X.509v3 certificate that specifies at least one
|
|
// key usage, ensure that the certificate key can be used for key encryption.
|
|
if (certificate.Version is >= 3)
|
|
{
|
|
var extensions = certificate.Extensions.OfType<X509KeyUsageExtension>().ToList();
|
|
if (extensions.Count is not 0 && !extensions.Exists(static extension =>
|
|
extension.KeyUsages.HasFlag(X509KeyUsageFlags.KeyEncipherment)))
|
|
{
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0060));
|
|
}
|
|
}
|
|
|
|
if (!certificate.HasPrivateKey)
|
|
{
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0061));
|
|
}
|
|
|
|
return AddEncryptionKey(new X509SecurityKey(certificate));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers an encryption certificate retrieved from an embedded resource.
|
|
/// </summary>
|
|
/// <param name="assembly">The assembly containing the certificate.</param>
|
|
/// <param name="resource">The name of the embedded resource.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificate(
|
|
Assembly assembly, string resource, string? password)
|
|
#if SUPPORTS_EPHEMERAL_KEY_SETS
|
|
// Note: ephemeral key sets are currently not supported on macOS.
|
|
=> AddEncryptionCertificate(assembly, resource, password, OperatingSystem.IsMacOS() ?
|
|
X509KeyStorageFlags.MachineKeySet :
|
|
X509KeyStorageFlags.EphemeralKeySet);
|
|
#else
|
|
=> AddEncryptionCertificate(assembly, resource, password, X509KeyStorageFlags.MachineKeySet);
|
|
#endif
|
|
|
|
/// <summary>
|
|
/// Registers an encryption certificate retrieved from an embedded resource.
|
|
/// </summary>
|
|
/// <param name="assembly">The assembly containing the certificate.</param>
|
|
/// <param name="resource">The name of the embedded resource.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <param name="flags">An enumeration of flags indicating how and where to store the private key of the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificate(
|
|
Assembly assembly, string resource,
|
|
string? password, X509KeyStorageFlags flags)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(assembly);
|
|
ArgumentException.ThrowIfNullOrEmpty(resource);
|
|
|
|
using var stream = assembly.GetManifestResourceStream(resource) ??
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0064));
|
|
|
|
return AddEncryptionCertificate(stream, password, flags);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers an encryption certificate extracted from a stream.
|
|
/// </summary>
|
|
/// <param name="stream">The stream containing the certificate.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificate(Stream stream, string? password)
|
|
#if SUPPORTS_EPHEMERAL_KEY_SETS
|
|
// Note: ephemeral key sets are currently not supported on macOS.
|
|
=> AddEncryptionCertificate(stream, password, OperatingSystem.IsMacOS() ?
|
|
X509KeyStorageFlags.MachineKeySet :
|
|
X509KeyStorageFlags.EphemeralKeySet);
|
|
#else
|
|
=> AddEncryptionCertificate(stream, password, X509KeyStorageFlags.MachineKeySet);
|
|
#endif
|
|
|
|
/// <summary>
|
|
/// Registers an encryption certificate extracted from a stream.
|
|
/// </summary>
|
|
/// <param name="stream">The stream containing the certificate.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <param name="flags">An enumeration of flags indicating how and where to store the private key of the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificate(
|
|
Stream stream, string? password, X509KeyStorageFlags flags)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(stream);
|
|
|
|
using var buffer = new MemoryStream();
|
|
stream.CopyTo(buffer);
|
|
|
|
#if SUPPORTS_CERTIFICATE_LOADER
|
|
var certificate = X509Certificate2.GetCertContentType(buffer.ToArray()) switch
|
|
{
|
|
X509ContentType.Pkcs12 => X509CertificateLoader.LoadPkcs12(buffer.ToArray(), password, flags),
|
|
|
|
_ => throw new InvalidOperationException(SR.GetResourceString(SR.ID0454))
|
|
};
|
|
#else
|
|
var certificate = new X509Certificate2(buffer.ToArray(), password, flags);
|
|
#endif
|
|
return AddEncryptionCertificate(certificate);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers an encryption certificate retrieved from the X.509 user or machine store.
|
|
/// </summary>
|
|
/// <param name="thumbprint">The thumbprint of the certificate used to identify it in the X.509 store.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificate(string thumbprint)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(thumbprint);
|
|
|
|
return AddEncryptionCertificate(
|
|
GetCertificate(StoreLocation.CurrentUser, thumbprint) ??
|
|
GetCertificate(StoreLocation.LocalMachine, thumbprint) ??
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0066)));
|
|
|
|
static X509Certificate2? GetCertificate(StoreLocation location, string thumbprint)
|
|
{
|
|
using var store = new X509Store(StoreName.My, location);
|
|
store.Open(OpenFlags.ReadOnly);
|
|
|
|
return store.Certificates.Find(X509FindType.FindByThumbprint, thumbprint, validOnly: false)
|
|
.Cast<X509Certificate2>()
|
|
.SingleOrDefault();
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers an encryption certificate retrieved from the specified X.509 store.
|
|
/// </summary>
|
|
/// <param name="thumbprint">The thumbprint of the certificate used to identify it in the X.509 store.</param>
|
|
/// <param name="name">The name of the X.509 store.</param>
|
|
/// <param name="location">The location of the X.509 store.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificate(
|
|
string thumbprint, StoreName name, StoreLocation location)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(thumbprint);
|
|
|
|
using var store = new X509Store(name, location);
|
|
store.Open(OpenFlags.ReadOnly);
|
|
|
|
return AddEncryptionCertificate(
|
|
store.Certificates.Find(X509FindType.FindByThumbprint, thumbprint, validOnly: false)
|
|
.Cast<X509Certificate2>()
|
|
.SingleOrDefault() ?? throw new InvalidOperationException(SR.GetResourceString(SR.ID0066)));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers multiple encryption certificates.
|
|
/// </summary>
|
|
/// <param name="certificates">The encryption certificates.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddEncryptionCertificates(IEnumerable<X509Certificate2> certificates)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(certificates);
|
|
|
|
return certificates.Aggregate(this, static (builder, certificate) => builder.AddEncryptionCertificate(certificate));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers signing credentials.
|
|
/// </summary>
|
|
/// <param name="credentials">The signing credentials.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCredentials(SigningCredentials credentials)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(credentials);
|
|
|
|
return Configure(options => options.SigningCredentials.Add(credentials));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers a signing key.
|
|
/// </summary>
|
|
/// <param name="key">The security key.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningKey(SecurityKey key)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(key);
|
|
|
|
// If the signing key is an asymmetric security key, ensure it has a private key.
|
|
if (key is AsymmetricSecurityKey { PrivateKeyStatus: PrivateKeyStatus.DoesNotExist })
|
|
{
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0067));
|
|
}
|
|
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.RsaSha256))
|
|
{
|
|
return AddSigningCredentials(new SigningCredentials(key, SecurityAlgorithms.RsaSha256));
|
|
}
|
|
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.HmacSha256))
|
|
{
|
|
return AddSigningCredentials(new SigningCredentials(key, SecurityAlgorithms.HmacSha256));
|
|
}
|
|
|
|
#if SUPPORTS_ECDSA
|
|
// Note: ECDSA algorithms are bound to specific curves and must be treated separately.
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.EcdsaSha256))
|
|
{
|
|
return AddSigningCredentials(new SigningCredentials(key, SecurityAlgorithms.EcdsaSha256));
|
|
}
|
|
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.EcdsaSha384))
|
|
{
|
|
return AddSigningCredentials(new SigningCredentials(key, SecurityAlgorithms.EcdsaSha384));
|
|
}
|
|
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.EcdsaSha512))
|
|
{
|
|
return AddSigningCredentials(new SigningCredentials(key, SecurityAlgorithms.EcdsaSha512));
|
|
}
|
|
#else
|
|
if (key.IsSupportedAlgorithm(SecurityAlgorithms.EcdsaSha256) ||
|
|
key.IsSupportedAlgorithm(SecurityAlgorithms.EcdsaSha384) ||
|
|
key.IsSupportedAlgorithm(SecurityAlgorithms.EcdsaSha512))
|
|
{
|
|
throw new PlatformNotSupportedException(SR.GetResourceString(SR.ID0069));
|
|
}
|
|
#endif
|
|
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0068));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers multiple signing keys.
|
|
/// </summary>
|
|
/// <param name="keys">The signing keys.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningKeys(IEnumerable<SecurityKey> keys)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(keys);
|
|
|
|
return keys.Aggregate(this, static (builder, key) => builder.AddSigningKey(key));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers a signing certificate.
|
|
/// </summary>
|
|
/// <param name="certificate">The signing certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificate(X509Certificate2 certificate)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(certificate);
|
|
|
|
// If the certificate is a X.509v3 certificate that specifies at least
|
|
// one key usage, ensure that the certificate key can be used for signing.
|
|
if (certificate.Version is >= 3)
|
|
{
|
|
var extensions = certificate.Extensions.OfType<X509KeyUsageExtension>().ToList();
|
|
if (extensions.Count is not 0 && !extensions.Exists(static extension =>
|
|
extension.KeyUsages.HasFlag(X509KeyUsageFlags.DigitalSignature)))
|
|
{
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0070));
|
|
}
|
|
}
|
|
|
|
if (!certificate.HasPrivateKey)
|
|
{
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0061));
|
|
}
|
|
|
|
return AddSigningKey(new X509SecurityKey(certificate));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers a signing certificate retrieved from an embedded resource.
|
|
/// </summary>
|
|
/// <param name="assembly">The assembly containing the certificate.</param>
|
|
/// <param name="resource">The name of the embedded resource.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificate(Assembly assembly, string resource, string? password)
|
|
#if SUPPORTS_EPHEMERAL_KEY_SETS
|
|
// Note: ephemeral key sets are currently not supported on macOS.
|
|
=> AddSigningCertificate(assembly, resource, password, OperatingSystem.IsMacOS() ?
|
|
X509KeyStorageFlags.MachineKeySet :
|
|
X509KeyStorageFlags.EphemeralKeySet);
|
|
#else
|
|
=> AddSigningCertificate(assembly, resource, password, X509KeyStorageFlags.MachineKeySet);
|
|
#endif
|
|
|
|
/// <summary>
|
|
/// Registers a signing certificate retrieved from an embedded resource.
|
|
/// </summary>
|
|
/// <param name="assembly">The assembly containing the certificate.</param>
|
|
/// <param name="resource">The name of the embedded resource.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <param name="flags">An enumeration of flags indicating how and where to store the private key of the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificate(
|
|
Assembly assembly, string resource,
|
|
string? password, X509KeyStorageFlags flags)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(assembly);
|
|
ArgumentException.ThrowIfNullOrEmpty(resource);
|
|
|
|
using var stream = assembly.GetManifestResourceStream(resource) ??
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0064));
|
|
|
|
return AddSigningCertificate(stream, password, flags);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers a signing certificate extracted from a stream.
|
|
/// </summary>
|
|
/// <param name="stream">The stream containing the certificate.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificate(Stream stream, string? password)
|
|
#if SUPPORTS_EPHEMERAL_KEY_SETS
|
|
// Note: ephemeral key sets are currently not supported on macOS.
|
|
=> AddSigningCertificate(stream, password, OperatingSystem.IsMacOS() ?
|
|
X509KeyStorageFlags.MachineKeySet :
|
|
X509KeyStorageFlags.EphemeralKeySet);
|
|
#else
|
|
=> AddSigningCertificate(stream, password, X509KeyStorageFlags.MachineKeySet);
|
|
#endif
|
|
|
|
/// <summary>
|
|
/// Registers a signing certificate extracted from a stream.
|
|
/// </summary>
|
|
/// <param name="stream">The stream containing the certificate.</param>
|
|
/// <param name="password">The password used to open the certificate.</param>
|
|
/// <param name="flags">An enumeration of flags indicating how and where to store the private key of the certificate.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificate(Stream stream, string? password, X509KeyStorageFlags flags)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(stream);
|
|
|
|
using var buffer = new MemoryStream();
|
|
stream.CopyTo(buffer);
|
|
|
|
#if SUPPORTS_CERTIFICATE_LOADER
|
|
var certificate = X509Certificate2.GetCertContentType(buffer.ToArray()) switch
|
|
{
|
|
X509ContentType.Pkcs12 => X509CertificateLoader.LoadPkcs12(buffer.ToArray(), password, flags),
|
|
|
|
_ => throw new InvalidOperationException(SR.GetResourceString(SR.ID0454))
|
|
};
|
|
#else
|
|
var certificate = new X509Certificate2(buffer.ToArray(), password, flags);
|
|
#endif
|
|
return AddSigningCertificate(certificate);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers a signing certificate retrieved from the X.509 user or machine store.
|
|
/// </summary>
|
|
/// <param name="thumbprint">The thumbprint of the certificate used to identify it in the X.509 store.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificate(string thumbprint)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(thumbprint);
|
|
|
|
return AddSigningCertificate(
|
|
GetCertificate(StoreLocation.CurrentUser, thumbprint) ??
|
|
GetCertificate(StoreLocation.LocalMachine, thumbprint) ??
|
|
throw new InvalidOperationException(SR.GetResourceString(SR.ID0066)));
|
|
|
|
static X509Certificate2? GetCertificate(StoreLocation location, string thumbprint)
|
|
{
|
|
using var store = new X509Store(StoreName.My, location);
|
|
store.Open(OpenFlags.ReadOnly);
|
|
|
|
return store.Certificates.Find(X509FindType.FindByThumbprint, thumbprint, validOnly: false)
|
|
.Cast<X509Certificate2>()
|
|
.SingleOrDefault();
|
|
}
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers a signing certificate retrieved from the specified X.509 store.
|
|
/// </summary>
|
|
/// <param name="thumbprint">The thumbprint of the certificate used to identify it in the X.509 store.</param>
|
|
/// <param name="name">The name of the X.509 store.</param>
|
|
/// <param name="location">The location of the X.509 store.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificate(string thumbprint, StoreName name, StoreLocation location)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(thumbprint);
|
|
|
|
using var store = new X509Store(name, location);
|
|
store.Open(OpenFlags.ReadOnly);
|
|
|
|
return AddSigningCertificate(
|
|
store.Certificates.Find(X509FindType.FindByThumbprint, thumbprint, validOnly: false)
|
|
.Cast<X509Certificate2>()
|
|
.SingleOrDefault() ?? throw new InvalidOperationException(SR.GetResourceString(SR.ID0066)));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers multiple signing certificates.
|
|
/// </summary>
|
|
/// <param name="certificates">The signing certificates.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddSigningCertificates(IEnumerable<X509Certificate2> certificates)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(certificates);
|
|
|
|
return certificates.Aggregate(this, static (builder, certificate) => builder.AddSigningCertificate(certificate));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Registers the specified values as valid audiences. Setting the audiences is recommended
|
|
/// when the authorization server issues access tokens for multiple distinct resource servers.
|
|
/// </summary>
|
|
/// <param name="audiences">The audiences valid for this resource server.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder AddAudiences(params string[] audiences)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(audiences);
|
|
|
|
if (Array.Exists(audiences, string.IsNullOrEmpty))
|
|
{
|
|
throw new ArgumentException(SR.GetResourceString(SR.ID0123), nameof(audiences));
|
|
}
|
|
|
|
return Configure(options => options.Audiences.UnionWith(audiences));
|
|
}
|
|
|
|
/// <summary>
|
|
/// Enables authorization validation so that a database call is made for each API request
|
|
/// to ensure the authorization associated with the access token is still valid.
|
|
/// Note: enabling this option may have an impact on performance and
|
|
/// can only be used with an OpenIddict-based authorization server.
|
|
/// </summary>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder EnableAuthorizationEntryValidation()
|
|
=> Configure(options => options.EnableAuthorizationEntryValidation = true);
|
|
|
|
/// <summary>
|
|
/// Enables token validation so that a database call is made for each API request
|
|
/// to ensure the token entry associated with the access token is still valid.
|
|
/// Note: enabling this option may have an impact on performance but is required
|
|
/// when the OpenIddict server is configured to use reference tokens.
|
|
/// </summary>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder EnableTokenEntryValidation()
|
|
=> Configure(options => options.EnableTokenEntryValidation = true);
|
|
|
|
/// <summary>
|
|
/// Sets the client assertion lifetime, after which backchannel requests
|
|
/// using an expired client assertion should be automatically rejected by the server.
|
|
/// Using long-lived client assertion or assertions that never expire is not recommended.
|
|
/// While discouraged, <see langword="null"/> can be specified to issue assertions that never expire.
|
|
/// </summary>
|
|
/// <param name="lifetime">The access token lifetime.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder SetClientAssertionLifetime(TimeSpan? lifetime)
|
|
=> Configure(options => options.ClientAssertionLifetime = lifetime);
|
|
|
|
/// <summary>
|
|
/// Sets a static OpenID Connect server configuration, that will be used to
|
|
/// resolve the metadata/introspection endpoints and the issuer signing keys.
|
|
/// </summary>
|
|
/// <param name="configuration">The server configuration.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder SetConfiguration(OpenIddictConfiguration configuration)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(configuration);
|
|
|
|
return Configure(options => options.Configuration = configuration);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Sets the issuer that will be attached to the <see cref="Claim"/>
|
|
/// instances created by the OpenIddict validation stack.
|
|
/// </summary>
|
|
/// <param name="issuer">The claims issuer.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder SetClaimsIssuer(string issuer)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(issuer);
|
|
|
|
return Configure(options => options.ClaimsIssuer = issuer);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Sets the client identifier client_id used when communicating
|
|
/// with the remote authorization server (e.g for introspection).
|
|
/// </summary>
|
|
/// <param name="identifier">The client identifier.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder SetClientId(string identifier)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(identifier);
|
|
|
|
return Configure(options => options.ClientId = identifier);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Sets the client identifier client_secret used when communicating
|
|
/// with the remote authorization server (e.g for introspection).
|
|
/// </summary>
|
|
/// <param name="secret">The client secret.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder SetClientSecret(string secret)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(secret);
|
|
|
|
return Configure(options => options.ClientSecret = secret);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Sets the issuer URI, which is used to determine the actual location of the
|
|
/// OAuth 2.0/OpenID Connect configuration document when using provider discovery.
|
|
/// </summary>
|
|
/// <param name="uri">The issuer URI.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder SetIssuer(Uri uri)
|
|
{
|
|
ArgumentNullException.ThrowIfNull(uri);
|
|
|
|
return Configure(options => options.Issuer = uri);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Sets the issuer URI, which is used to determine the actual location of the
|
|
/// OAuth 2.0/OpenID Connect configuration document when using provider discovery.
|
|
/// </summary>
|
|
/// <param name="uri">The issuer URI.</param>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder SetIssuer([StringSyntax(StringSyntaxAttribute.Uri)] string uri)
|
|
{
|
|
ArgumentException.ThrowIfNullOrEmpty(uri);
|
|
|
|
if (!Uri.TryCreate(uri, UriKind.Absolute, out Uri? value) || OpenIddictHelpers.IsImplicitFileUri(value))
|
|
{
|
|
throw new ArgumentException(SR.GetResourceString(SR.ID0023), nameof(uri));
|
|
}
|
|
|
|
return SetIssuer(value);
|
|
}
|
|
|
|
/// <summary>
|
|
/// Configures OpenIddict to use introspection instead of local/direct validation.
|
|
/// </summary>
|
|
/// <returns>The <see cref="OpenIddictValidationBuilder"/> instance.</returns>
|
|
public OpenIddictValidationBuilder UseIntrospection()
|
|
=> Configure(options => options.ValidationType = OpenIddictValidationType.Introspection);
|
|
|
|
/// <inheritdoc/>
|
|
[EditorBrowsable(EditorBrowsableState.Never)]
|
|
public override bool Equals(object? obj) => base.Equals(obj);
|
|
|
|
/// <inheritdoc/>
|
|
[EditorBrowsable(EditorBrowsableState.Never)]
|
|
public override int GetHashCode() => base.GetHashCode();
|
|
|
|
/// <inheritdoc/>
|
|
[EditorBrowsable(EditorBrowsableState.Never)]
|
|
public override string? ToString() => base.ToString();
|
|
}
|
|
|