This commit is contained in:
2023-02-19 00:43:43 +01:00
parent 9719a0c0fd
commit 1e66851113
146 changed files with 738 additions and 382 deletions

View File

@ -0,0 +1,33 @@
using Microsoft.AspNetCore.Authentication;
using Microsoft.IdentityModel.Tokens;
using PrivaPub.Services;
using System.Text;
namespace PrivaPub.Extensions
{
public static class AddAuthExtension
{
public static AuthenticationBuilder AddPrivaPubAuth(this AuthenticationBuilder builder, IConfiguration configuration)
{
builder.AddJwtBearer(options => {
#if DEBUG
options.RequireHttpsMetadata = false;
#endif
options.TokenValidationParameters = new()
{
ValidateIssuer = true,
ValidateAudience = true,
ValidateLifetime = true,
ValidateIssuerSigningKey = true,
ValidIssuer = configuration["AppConfiguration:Jwt:Issuer"],
ValidAudience = configuration["AppConfiguration:Jwt:Audience"],
IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(configuration["AppConfiguration:Jwt:Key"]))
};
options.Events = new JwtEvents();
});
return builder;
}
}
}

View File

@ -0,0 +1,93 @@
using Microsoft.AspNetCore.Authorization;
using Org.BouncyCastle.Asn1.X509;
using Org.BouncyCastle.Crypto.Generators;
using Org.BouncyCastle.Crypto.Prng;
using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Security;
using Org.BouncyCastle.X509;
using PrivaPub.ClientModels;
using System.Security.Cryptography.X509Certificates;
using Org.BouncyCastle.Math;
using PrivaPub.Models.User;
using System.Security.Claims;
namespace PrivaPub.Extensions
{
public static class Extensions
{
public static string GetLogsConnectionString(this IConfiguration configuration) =>
configuration.GetSection("Serilog")
?.GetSection("WriteTo")
?.GetChildren()
?.First()
?.GetSection("Args")
?.GetSection("databaseUrl")
?.Value;
public static AuthorizationPolicy IsAdminPolicy() =>
new AuthorizationPolicyBuilder().RequireAuthenticatedUser()
.RequireClaim(Policies.IsAdmin, true.ToString().ToLower())
.RequireClaim(Policies.IsUser, true.ToString().ToLower())
.RequireClaim(Policies.IsModerator, true.ToString().ToLower())
.Build();
public static AuthorizationPolicy IsUserPolicy() =>
new AuthorizationPolicyBuilder().RequireAuthenticatedUser()
.RequireClaim(Policies.IsUser, true.ToString().ToLower())
.Build();
public static AuthorizationPolicy IsModeratorPolicy() =>
new AuthorizationPolicyBuilder().RequireAuthenticatedUser()
.RequireClaim(Policies.IsUser, true.ToString().ToLower())
.RequireClaim(Policies.IsModerator, true.ToString().ToLower())
.Build();
public static string GetHostWithPath(this HttpContext httpContext) =>
$"https://{httpContext.Request.Host}{httpContext.Request.Path}";
public static string GetHost(this HttpContext httpContext) =>
$"https://{httpContext.Request.Host}";
public static X509Certificate2 GetX509Certificate2(string certName)
{
var keypairgen = new RsaKeyPairGenerator();
keypairgen.Init(new KeyGenerationParameters(new SecureRandom(new CryptoApiRandomGenerator()), 512));
var keypair = keypairgen.GenerateKeyPair();
var gen = new X509V3CertificateGenerator();
var CN = new X509Name("CN=" + certName);
var SN = BigInteger.ProbablePrime(120, new Random());
gen.SetSerialNumber(SN);
gen.SetSubjectDN(CN);
gen.SetIssuerDN(CN);
gen.SetNotAfter(DateTime.MaxValue);
gen.SetNotBefore(DateTime.Now.Subtract(new TimeSpan(7, 0, 0, 0)));
gen.SetSignatureAlgorithm("MD5WithRSA");
gen.SetPublicKey(keypair.Public);
var newCert = gen.Generate(keypair.Private);
return new X509Certificate2(DotNetUtilities.ToX509Certificate((Org.BouncyCastle.X509.X509Certificate)newCert));
}
public static UserPolicyType GetHighestPolicy(this ClaimsPrincipal claimsPrincipal)
{
if (bool.Parse(claimsPrincipal.FindFirstValue(Policies.IsAdmin)))
return UserPolicyType.IsAdmin;
if (bool.Parse(claimsPrincipal.FindFirstValue(Policies.IsModerator)))
return UserPolicyType.IsModerator;
if (bool.Parse(claimsPrincipal.FindFirstValue(Policies.IsUser)))
return UserPolicyType.IsUser;
return UserPolicyType.IsUser;
}
}
}

View File

@ -0,0 +1,23 @@

using Microsoft.AspNetCore.Mvc;
using Microsoft.AspNetCore.Mvc.Filters;
namespace PrivaPub.Extensions
{
public class OperationCancelledExceptionFilter : ExceptionFilterAttribute
{
readonly Serilog.ILogger Logger;
public OperationCancelledExceptionFilter(Serilog.ILogger logger) =>
Logger = logger.ForContext<OperationCancelledExceptionFilter>();
public override void OnException(ExceptionContext context)
{
if (context.Exception is not OperationCanceledException) return;
Logger.Information($"Request for {context.HttpContext.Request.Path} was cancelled.");
context.ExceptionHandled = true;
context.Result = new StatusCodeResult(499);
}
}
}

View File

@ -0,0 +1,36 @@
using PrivaPub.ClientModels;
using System.Security.Claims;
namespace PrivaPub.Extensions
{
public static class StringExtensions
{
public static string GetUserId(this ClaimsPrincipal claimsPrincipal)
{
return claimsPrincipal?.Claims?.FirstOrDefault(c => c.Type == ClaimTypes.UserData)?.Value;
}
public static string GetUserName(this ClaimsPrincipal claimsPrincipal)
{
var userId = claimsPrincipal.Claims.FirstOrDefault(c => c.Type == ClaimTypes.Name)?.Value;
return string.IsNullOrEmpty(userId) ? default : userId;
}
public static List<string> GetUserPolicies(this ClaimsPrincipal claimsPrincipal)
{
var policies = new List<string>();
if (claimsPrincipal.Claims.Any(c => c.Type == Policies.IsAdmin && bool.Parse(c.Value)))
policies.Add(Policies.IsAdmin);
if (claimsPrincipal.Claims.Any(c => c.Type == Policies.IsUser && bool.Parse(c.Value)))
policies.Add(Policies.IsUser);
if (claimsPrincipal.Claims.Any(c => c.Type == Policies.IsModerator && bool.Parse(c.Value)))
policies.Add(Policies.IsModerator);
return policies;
}
}
}