Saving
This commit is contained in:
33
PrivaPub/Extensions/AddAuthExtension.cs
Normal file
33
PrivaPub/Extensions/AddAuthExtension.cs
Normal file
@ -0,0 +1,33 @@
|
||||
using Microsoft.AspNetCore.Authentication;
|
||||
using Microsoft.IdentityModel.Tokens;
|
||||
|
||||
using PrivaPub.Services;
|
||||
|
||||
using System.Text;
|
||||
|
||||
namespace PrivaPub.Extensions
|
||||
{
|
||||
public static class AddAuthExtension
|
||||
{
|
||||
public static AuthenticationBuilder AddPrivaPubAuth(this AuthenticationBuilder builder, IConfiguration configuration)
|
||||
{
|
||||
builder.AddJwtBearer(options => {
|
||||
#if DEBUG
|
||||
options.RequireHttpsMetadata = false;
|
||||
#endif
|
||||
options.TokenValidationParameters = new()
|
||||
{
|
||||
ValidateIssuer = true,
|
||||
ValidateAudience = true,
|
||||
ValidateLifetime = true,
|
||||
ValidateIssuerSigningKey = true,
|
||||
ValidIssuer = configuration["AppConfiguration:Jwt:Issuer"],
|
||||
ValidAudience = configuration["AppConfiguration:Jwt:Audience"],
|
||||
IssuerSigningKey = new SymmetricSecurityKey(Encoding.UTF8.GetBytes(configuration["AppConfiguration:Jwt:Key"]))
|
||||
};
|
||||
options.Events = new JwtEvents();
|
||||
});
|
||||
return builder;
|
||||
}
|
||||
}
|
||||
}
|
93
PrivaPub/Extensions/Extensions.cs
Normal file
93
PrivaPub/Extensions/Extensions.cs
Normal file
@ -0,0 +1,93 @@
|
||||
using Microsoft.AspNetCore.Authorization;
|
||||
|
||||
using Org.BouncyCastle.Asn1.X509;
|
||||
using Org.BouncyCastle.Crypto.Generators;
|
||||
using Org.BouncyCastle.Crypto.Prng;
|
||||
using Org.BouncyCastle.Crypto;
|
||||
using Org.BouncyCastle.Security;
|
||||
using Org.BouncyCastle.X509;
|
||||
|
||||
using PrivaPub.ClientModels;
|
||||
|
||||
using System.Security.Cryptography.X509Certificates;
|
||||
using Org.BouncyCastle.Math;
|
||||
using PrivaPub.Models.User;
|
||||
using System.Security.Claims;
|
||||
|
||||
namespace PrivaPub.Extensions
|
||||
{
|
||||
public static class Extensions
|
||||
{
|
||||
public static string GetLogsConnectionString(this IConfiguration configuration) =>
|
||||
configuration.GetSection("Serilog")
|
||||
?.GetSection("WriteTo")
|
||||
?.GetChildren()
|
||||
?.First()
|
||||
?.GetSection("Args")
|
||||
?.GetSection("databaseUrl")
|
||||
?.Value;
|
||||
|
||||
public static AuthorizationPolicy IsAdminPolicy() =>
|
||||
new AuthorizationPolicyBuilder().RequireAuthenticatedUser()
|
||||
.RequireClaim(Policies.IsAdmin, true.ToString().ToLower())
|
||||
.RequireClaim(Policies.IsUser, true.ToString().ToLower())
|
||||
.RequireClaim(Policies.IsModerator, true.ToString().ToLower())
|
||||
.Build();
|
||||
|
||||
public static AuthorizationPolicy IsUserPolicy() =>
|
||||
new AuthorizationPolicyBuilder().RequireAuthenticatedUser()
|
||||
.RequireClaim(Policies.IsUser, true.ToString().ToLower())
|
||||
.Build();
|
||||
|
||||
public static AuthorizationPolicy IsModeratorPolicy() =>
|
||||
new AuthorizationPolicyBuilder().RequireAuthenticatedUser()
|
||||
.RequireClaim(Policies.IsUser, true.ToString().ToLower())
|
||||
.RequireClaim(Policies.IsModerator, true.ToString().ToLower())
|
||||
.Build();
|
||||
|
||||
public static string GetHostWithPath(this HttpContext httpContext) =>
|
||||
$"https://{httpContext.Request.Host}{httpContext.Request.Path}";
|
||||
|
||||
public static string GetHost(this HttpContext httpContext) =>
|
||||
$"https://{httpContext.Request.Host}";
|
||||
|
||||
public static X509Certificate2 GetX509Certificate2(string certName)
|
||||
{
|
||||
var keypairgen = new RsaKeyPairGenerator();
|
||||
keypairgen.Init(new KeyGenerationParameters(new SecureRandom(new CryptoApiRandomGenerator()), 512));
|
||||
|
||||
var keypair = keypairgen.GenerateKeyPair();
|
||||
|
||||
var gen = new X509V3CertificateGenerator();
|
||||
|
||||
var CN = new X509Name("CN=" + certName);
|
||||
var SN = BigInteger.ProbablePrime(120, new Random());
|
||||
|
||||
gen.SetSerialNumber(SN);
|
||||
gen.SetSubjectDN(CN);
|
||||
gen.SetIssuerDN(CN);
|
||||
gen.SetNotAfter(DateTime.MaxValue);
|
||||
gen.SetNotBefore(DateTime.Now.Subtract(new TimeSpan(7, 0, 0, 0)));
|
||||
gen.SetSignatureAlgorithm("MD5WithRSA");
|
||||
gen.SetPublicKey(keypair.Public);
|
||||
|
||||
var newCert = gen.Generate(keypair.Private);
|
||||
|
||||
return new X509Certificate2(DotNetUtilities.ToX509Certificate((Org.BouncyCastle.X509.X509Certificate)newCert));
|
||||
}
|
||||
|
||||
public static UserPolicyType GetHighestPolicy(this ClaimsPrincipal claimsPrincipal)
|
||||
{
|
||||
if (bool.Parse(claimsPrincipal.FindFirstValue(Policies.IsAdmin)))
|
||||
return UserPolicyType.IsAdmin;
|
||||
|
||||
if (bool.Parse(claimsPrincipal.FindFirstValue(Policies.IsModerator)))
|
||||
return UserPolicyType.IsModerator;
|
||||
|
||||
if (bool.Parse(claimsPrincipal.FindFirstValue(Policies.IsUser)))
|
||||
return UserPolicyType.IsUser;
|
||||
|
||||
return UserPolicyType.IsUser;
|
||||
}
|
||||
}
|
||||
}
|
23
PrivaPub/Extensions/OperationCancelledExceptionFilter.cs
Normal file
23
PrivaPub/Extensions/OperationCancelledExceptionFilter.cs
Normal file
@ -0,0 +1,23 @@
|
||||
|
||||
using Microsoft.AspNetCore.Mvc;
|
||||
using Microsoft.AspNetCore.Mvc.Filters;
|
||||
|
||||
namespace PrivaPub.Extensions
|
||||
{
|
||||
public class OperationCancelledExceptionFilter : ExceptionFilterAttribute
|
||||
{
|
||||
readonly Serilog.ILogger Logger;
|
||||
|
||||
public OperationCancelledExceptionFilter(Serilog.ILogger logger) =>
|
||||
Logger = logger.ForContext<OperationCancelledExceptionFilter>();
|
||||
|
||||
public override void OnException(ExceptionContext context)
|
||||
{
|
||||
if (context.Exception is not OperationCanceledException) return;
|
||||
|
||||
Logger.Information($"Request for {context.HttpContext.Request.Path} was cancelled.");
|
||||
context.ExceptionHandled = true;
|
||||
context.Result = new StatusCodeResult(499);
|
||||
}
|
||||
}
|
||||
}
|
36
PrivaPub/Extensions/StringExtensions.cs
Normal file
36
PrivaPub/Extensions/StringExtensions.cs
Normal file
@ -0,0 +1,36 @@
|
||||
using PrivaPub.ClientModels;
|
||||
|
||||
using System.Security.Claims;
|
||||
|
||||
namespace PrivaPub.Extensions
|
||||
{
|
||||
public static class StringExtensions
|
||||
{
|
||||
public static string GetUserId(this ClaimsPrincipal claimsPrincipal)
|
||||
{
|
||||
return claimsPrincipal?.Claims?.FirstOrDefault(c => c.Type == ClaimTypes.UserData)?.Value;
|
||||
}
|
||||
|
||||
public static string GetUserName(this ClaimsPrincipal claimsPrincipal)
|
||||
{
|
||||
var userId = claimsPrincipal.Claims.FirstOrDefault(c => c.Type == ClaimTypes.Name)?.Value;
|
||||
return string.IsNullOrEmpty(userId) ? default : userId;
|
||||
}
|
||||
|
||||
public static List<string> GetUserPolicies(this ClaimsPrincipal claimsPrincipal)
|
||||
{
|
||||
var policies = new List<string>();
|
||||
|
||||
if (claimsPrincipal.Claims.Any(c => c.Type == Policies.IsAdmin && bool.Parse(c.Value)))
|
||||
policies.Add(Policies.IsAdmin);
|
||||
|
||||
if (claimsPrincipal.Claims.Any(c => c.Type == Policies.IsUser && bool.Parse(c.Value)))
|
||||
policies.Add(Policies.IsUser);
|
||||
|
||||
if (claimsPrincipal.Claims.Any(c => c.Type == Policies.IsModerator && bool.Parse(c.Value)))
|
||||
policies.Add(Policies.IsModerator);
|
||||
|
||||
return policies;
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user