using Microsoft.AspNetCore.Authentication; using Microsoft.Extensions.Logging; using Microsoft.Extensions.Options; using Microsoft.Net.Http.Headers; using System; using System.Globalization; using System.Linq; using System.Security.Claims; using System.Text.Encodings.Web; using System.Threading.Tasks; using Timeline.Services; using static Timeline.Resources.Authentication.AuthHandler; namespace Timeline.Auth { public static class AuthenticationConstants { public const string Scheme = "Bearer"; public const string DisplayName = "My Jwt Auth Scheme"; public const string PermissionClaimName = "Permission"; } public class MyAuthenticationOptions : AuthenticationSchemeOptions { /// /// The query param key to search for token. If null then query params are not searched for token. Default to "token". /// public string TokenQueryParamKey { get; set; } = "token"; } public class MyAuthenticationHandler : AuthenticationHandler { private readonly ILogger _logger; private readonly IUserTokenManager _userTokenManager; private readonly IUserPermissionService _userPermissionService; public MyAuthenticationHandler(IOptionsMonitor options, ILoggerFactory logger, UrlEncoder encoder, ISystemClock clock, IUserTokenManager userTokenManager, IUserPermissionService userPermissionService) : base(options, logger, encoder, clock) { _logger = logger.CreateLogger(); _userTokenManager = userTokenManager; _userPermissionService = userPermissionService; } // return null if no token is found private string? ExtractToken() { // check the authorization header string header = Request.Headers[HeaderNames.Authorization]; if (!string.IsNullOrEmpty(header) && header.StartsWith("Bearer ", StringComparison.OrdinalIgnoreCase)) { var token = header.Substring("Bearer ".Length).Trim(); _logger.LogInformation(LogTokenFoundInHeader, token); return token; } // check the query params var paramQueryKey = Options.TokenQueryParamKey; if (!string.IsNullOrEmpty(paramQueryKey)) { string token = Request.Query[paramQueryKey]; if (!string.IsNullOrEmpty(token)) { _logger.LogInformation(LogTokenFoundInQuery, paramQueryKey, token); return token; } } // not found anywhere then return null return null; } protected override async Task HandleAuthenticateAsync() { var token = ExtractToken(); if (string.IsNullOrEmpty(token)) { _logger.LogInformation(LogTokenNotFound); return AuthenticateResult.NoResult(); } try { var user = await _userTokenManager.VerifyToken(token); var identity = new ClaimsIdentity(AuthenticationConstants.Scheme); identity.AddClaim(new Claim(ClaimTypes.NameIdentifier, user.Id.ToString(CultureInfo.InvariantCulture), ClaimValueTypes.Integer64)); identity.AddClaim(new Claim(identity.NameClaimType, user.Username, ClaimValueTypes.String)); var permissions = await _userPermissionService.GetPermissionsOfUserAsync(user.Id); identity.AddClaims(permissions.Select(permission => new Claim(AuthenticationConstants.PermissionClaimName, permission.ToString(), ClaimValueTypes.String))); var principal = new ClaimsPrincipal(); principal.AddIdentity(identity); return AuthenticateResult.Success(new AuthenticationTicket(principal, AuthenticationConstants.Scheme)); } catch (Exception e) when (!(e is ArgumentException)) { _logger.LogInformation(e, LogTokenValidationFail); return AuthenticateResult.Fail(e); } } } }