You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
149 lines
7.2 KiB
149 lines
7.2 KiB
/*
|
|
* Licensed under the Apache License, Version 2.0 (http://www.apache.org/licenses/LICENSE-2.0)
|
|
* See https://github.com/openiddict/openiddict-core for more information concerning
|
|
* the license and the contributors participating to this project.
|
|
*/
|
|
|
|
using System.Collections.Immutable;
|
|
using System.Security.Claims;
|
|
using Microsoft.AspNetCore.DataProtection;
|
|
using Microsoft.Extensions.Logging;
|
|
using Microsoft.Extensions.Options;
|
|
using Microsoft.IdentityModel.Tokens;
|
|
using OpenIddict.Extensions;
|
|
using static OpenIddict.Validation.DataProtection.OpenIddictValidationDataProtectionConstants.Purposes;
|
|
using static OpenIddict.Validation.OpenIddictValidationHandlers.Protection;
|
|
using Schemes = OpenIddict.Validation.DataProtection.OpenIddictValidationDataProtectionConstants.Purposes.Schemes;
|
|
|
|
namespace OpenIddict.Validation.DataProtection;
|
|
|
|
public static partial class OpenIddictValidationDataProtectionHandlers
|
|
{
|
|
public static class Protection
|
|
{
|
|
public static ImmutableArray<OpenIddictValidationHandlerDescriptor> DefaultHandlers { get; } =
|
|
[
|
|
/*
|
|
* Token validation:
|
|
*/
|
|
ValidateDataProtectionToken.Descriptor
|
|
];
|
|
|
|
/// <summary>
|
|
/// Contains the logic responsible for validating tokens generated using Data Protection.
|
|
/// </summary>
|
|
public sealed class ValidateDataProtectionToken : IOpenIddictValidationHandler<ValidateTokenContext>
|
|
{
|
|
private readonly IOptionsMonitor<OpenIddictValidationDataProtectionOptions> _options;
|
|
|
|
public ValidateDataProtectionToken(IOptionsMonitor<OpenIddictValidationDataProtectionOptions> options)
|
|
=> _options = options ?? throw new ArgumentNullException(nameof(options));
|
|
|
|
/// <summary>
|
|
/// Gets the default descriptor definition assigned to this handler.
|
|
/// </summary>
|
|
public static OpenIddictValidationHandlerDescriptor Descriptor { get; }
|
|
= OpenIddictValidationHandlerDescriptor.CreateBuilder<ValidateTokenContext>()
|
|
.UseSingletonHandler<ValidateDataProtectionToken>()
|
|
.SetOrder(ValidateIdentityModelToken.Descriptor.Order + 500)
|
|
.SetType(OpenIddictValidationHandlerType.BuiltIn)
|
|
.Build();
|
|
|
|
/// <inheritdoc/>
|
|
public ValueTask HandleAsync(ValidateTokenContext context)
|
|
{
|
|
// If a principal was already attached, don't overwrite it.
|
|
if (context.Principal is not null)
|
|
{
|
|
return default;
|
|
}
|
|
|
|
// If a specific token format is expected, return immediately if it doesn't match the expected value.
|
|
if (context.TokenFormat is not null and not TokenFormats.Private.DataProtection)
|
|
{
|
|
return default;
|
|
}
|
|
|
|
// Note: ASP.NET Core Data Protection tokens created by the default implementation always start
|
|
// with "CfDJ8", that corresponds to the base64 representation of the "09 F0 C9 F0" value used
|
|
// by KeyRingBasedDataProtectionProvider as a Data Protection version identifier/magic header.
|
|
//
|
|
// Unless a custom provider implementation - that may use a different mechanism - has been
|
|
// registered, return immediately if the token doesn't start with the expected magic header.
|
|
//
|
|
// See https://learn.microsoft.com/en-us/aspnet/core/security/data-protection/implementation/authenticated-encryption-details
|
|
// for more information.
|
|
if (!context.Token.StartsWith("CfDJ8", StringComparison.Ordinal) &&
|
|
string.Equals(_options.CurrentValue.DataProtectionProvider.GetType().FullName,
|
|
"Microsoft.AspNetCore.DataProtection.KeyManagement.KeyRingBasedDataProtectionProvider",
|
|
StringComparison.Ordinal))
|
|
{
|
|
return default;
|
|
}
|
|
|
|
// Note: unlike the equivalent handler in the server stack, the logic used here is
|
|
// simpler as only access tokens are currently supported by the validation stack.
|
|
var principal = context.ValidTokenTypes.Count switch
|
|
{
|
|
// If no valid token type was set, all supported token types are allowed.
|
|
0 => ValidateToken(TokenTypeIdentifiers.AccessToken),
|
|
|
|
_ when context.ValidTokenTypes.Contains(TokenTypeIdentifiers.AccessToken)
|
|
=> ValidateToken(TokenTypeIdentifiers.AccessToken),
|
|
|
|
_ => null // The token type is not supported by the Data Protection integration (e.g identity tokens).
|
|
};
|
|
|
|
if (principal is null)
|
|
{
|
|
context.Reject(
|
|
error: Errors.InvalidToken,
|
|
description: SR.GetResourceString(SR.ID2004),
|
|
uri: SR.FormatID8000(SR.ID2004));
|
|
|
|
return default;
|
|
}
|
|
|
|
context.Principal = principal;
|
|
|
|
context.Logger.LogTrace(6152, SR.GetResourceString(SR.ID6152), context.Token, context.Principal.Claims);
|
|
|
|
return default;
|
|
|
|
ClaimsPrincipal? ValidateToken(string type)
|
|
{
|
|
// Create a Data Protection protector using the provider registered in the options.
|
|
//
|
|
// Note: reference tokens are encrypted using a different "purpose" string than non-reference tokens.
|
|
var protector = _options.CurrentValue.DataProtectionProvider.CreateProtector(
|
|
(type, context.IsReferenceToken) switch
|
|
{
|
|
(TokenTypeIdentifiers.AccessToken, true)
|
|
=> [Handlers.Server, Formats.AccessToken, Features.ReferenceTokens, Schemes.Server],
|
|
(TokenTypeIdentifiers.AccessToken, false)
|
|
=> [Handlers.Server, Formats.AccessToken, Schemes.Server],
|
|
|
|
_ => throw new InvalidOperationException(SR.GetResourceString(SR.ID0003))
|
|
});
|
|
|
|
try
|
|
{
|
|
using var buffer = new MemoryStream(protector.Unprotect(Base64UrlEncoder.DecodeBytes(context.Token)));
|
|
using var reader = new BinaryReader(buffer);
|
|
|
|
// Note: since the data format relies on a data protector using different "purposes" strings
|
|
// per token type, the token processed at this stage is guaranteed to be of the expected type.
|
|
return _options.CurrentValue.Formatter.ReadToken(reader)?.SetTokenType(type);
|
|
}
|
|
|
|
catch (Exception exception) when (!OpenIddictHelpers.IsFatal(exception))
|
|
{
|
|
context.Logger.LogTrace(6153, exception, SR.GetResourceString(SR.ID6153), context.Token);
|
|
|
|
return null;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|