2020-05-09 22:16:16 +00:00
|
|
|
|
using System;
|
|
|
|
|
using System.Collections.Generic;
|
|
|
|
|
using System.Linq;
|
|
|
|
|
using System.Security.Claims;
|
|
|
|
|
using System.Text.Encodings.Web;
|
|
|
|
|
using System.Threading.Tasks;
|
|
|
|
|
using Microsoft.AspNetCore.Authentication;
|
|
|
|
|
using Microsoft.AspNetCore.Http;
|
|
|
|
|
using Microsoft.Extensions.Logging;
|
|
|
|
|
using Microsoft.Extensions.Options;
|
|
|
|
|
using Newtonsoft.Json;
|
2020-06-14 13:13:29 +00:00
|
|
|
|
using Wabbajack.Common;
|
|
|
|
|
using Wabbajack.Common.Serialization.Json;
|
2020-05-09 22:16:16 +00:00
|
|
|
|
using Wabbajack.Server.DataLayer;
|
2020-06-14 13:13:29 +00:00
|
|
|
|
using Wabbajack.Server.DTOs;
|
2020-05-09 22:16:16 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
namespace Wabbajack.BuildServer
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
public class ApiKeyAuthenticationOptions : AuthenticationSchemeOptions
|
|
|
|
|
{
|
|
|
|
|
public const string DefaultScheme = "API Key";
|
|
|
|
|
public string Scheme => DefaultScheme;
|
|
|
|
|
public string AuthenticationType = DefaultScheme;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public class ApiKeyAuthenticationHandler : AuthenticationHandler<ApiKeyAuthenticationOptions>
|
|
|
|
|
{
|
|
|
|
|
private const string ProblemDetailsContentType = "application/problem+json";
|
|
|
|
|
private readonly SqlService _sql;
|
|
|
|
|
private const string ApiKeyHeaderName = "X-Api-Key";
|
|
|
|
|
|
|
|
|
|
public ApiKeyAuthenticationHandler(
|
|
|
|
|
IOptionsMonitor<ApiKeyAuthenticationOptions> options,
|
|
|
|
|
ILoggerFactory logger,
|
|
|
|
|
UrlEncoder encoder,
|
|
|
|
|
ISystemClock clock,
|
|
|
|
|
SqlService db) : base(options, logger, encoder, clock)
|
|
|
|
|
{
|
|
|
|
|
_sql = db;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
protected override async Task<AuthenticateResult> HandleAuthenticateAsync()
|
|
|
|
|
{
|
2020-06-14 13:13:29 +00:00
|
|
|
|
var metricsKey = Request.Headers[Consts.MetricsKeyHeader].FirstOrDefault();
|
|
|
|
|
await LogRequest(metricsKey);
|
|
|
|
|
if (metricsKey != default)
|
|
|
|
|
{
|
|
|
|
|
if (await _sql.IsTarKey(metricsKey))
|
|
|
|
|
{
|
|
|
|
|
await _sql.IngestMetric(new Metric {Action = "TarKey", Subject = "Auth", MetricsKey = metricsKey, Timestamp = DateTime.UtcNow});
|
|
|
|
|
await Task.Delay(TimeSpan.FromSeconds(60));
|
|
|
|
|
throw new Exception("Error, lipsum timeout of the cross distant cloud.");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-09 22:16:16 +00:00
|
|
|
|
if (!Request.Headers.TryGetValue(ApiKeyHeaderName, out var apiKeyHeaderValues))
|
|
|
|
|
{
|
|
|
|
|
return AuthenticateResult.NoResult();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var providedApiKey = apiKeyHeaderValues.FirstOrDefault();
|
|
|
|
|
|
|
|
|
|
if (apiKeyHeaderValues.Count == 0 || string.IsNullOrWhiteSpace(providedApiKey))
|
|
|
|
|
{
|
|
|
|
|
return AuthenticateResult.NoResult();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
var owner = await _sql.LoginByApiKey(providedApiKey);
|
|
|
|
|
|
|
|
|
|
if (owner != null)
|
|
|
|
|
{
|
|
|
|
|
var claims = new List<Claim> {new Claim(ClaimTypes.Name, owner)};
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
claims.AddRange(existingApiKey.Roles.Select(role => new Claim(ClaimTypes.Role, role)));
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
var identity = new ClaimsIdentity(claims, Options.AuthenticationType);
|
|
|
|
|
var identities = new List<ClaimsIdentity> {identity};
|
|
|
|
|
var principal = new ClaimsPrincipal(identities);
|
|
|
|
|
var ticket = new AuthenticationTicket(principal, Options.Scheme);
|
|
|
|
|
|
|
|
|
|
return AuthenticateResult.Success(ticket);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return AuthenticateResult.Fail("Invalid API Key provided.");
|
|
|
|
|
}
|
|
|
|
|
|
2020-06-14 13:13:29 +00:00
|
|
|
|
[JsonName("RequestLog")]
|
|
|
|
|
public class RequestLog
|
|
|
|
|
{
|
|
|
|
|
public string Path { get; set; }
|
|
|
|
|
public string Query { get; set; }
|
|
|
|
|
public Dictionary<string, string[]> Headers { get; set; }
|
|
|
|
|
}
|
|
|
|
|
private async Task LogRequest(string metricsKey)
|
|
|
|
|
{
|
|
|
|
|
var action = new RequestLog {
|
|
|
|
|
Path = Request.Path,
|
|
|
|
|
Query = Request.QueryString.Value,
|
|
|
|
|
Headers = Request.Headers.GroupBy(s => s.Key)
|
|
|
|
|
.ToDictionary(s => s.Key, s => s.SelectMany(v => v.Value).ToArray())
|
|
|
|
|
};
|
|
|
|
|
await _sql.IngestAccess(Request.HttpContext.Connection.RemoteIpAddress.ToString(), action.ToJson());
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-09 22:16:16 +00:00
|
|
|
|
protected override async Task HandleChallengeAsync(AuthenticationProperties properties)
|
|
|
|
|
{
|
|
|
|
|
Response.StatusCode = 401;
|
|
|
|
|
Response.ContentType = ProblemDetailsContentType;
|
|
|
|
|
await Response.WriteAsync("Unauthorized");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
protected override async Task HandleForbiddenAsync(AuthenticationProperties properties)
|
|
|
|
|
{
|
|
|
|
|
Response.StatusCode = 403;
|
|
|
|
|
Response.ContentType = ProblemDetailsContentType;
|
|
|
|
|
await Response.WriteAsync("forbidden");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public static class ApiKeyAuthorizationHandlerExtensions
|
|
|
|
|
{
|
|
|
|
|
public static AuthenticationBuilder AddApiKeySupport(this AuthenticationBuilder authenticationBuilder, Action<ApiKeyAuthenticationOptions> options)
|
|
|
|
|
{
|
|
|
|
|
return authenticationBuilder.AddScheme<ApiKeyAuthenticationOptions, ApiKeyAuthenticationHandler>(ApiKeyAuthenticationOptions.DefaultScheme, options);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
}
|