mirror of
https://github.com/btcpayserver/btcpayserver.git
synced 2024-11-19 18:11:36 +01:00
6290b0f3bf
* Users list: Cleanups * Policies: Flip registration settings * Policies: Add RequireUserApproval setting * Add approval to user * Require approval on login and for API key * API handling * AccountController cleanups * Test fix * Apply suggestions from code review Co-authored-by: Nicolas Dorier <nicolas.dorier@gmail.com> * Add missing imports * Communicate login requirements to user on account creation * Add login requirements to basic auth handler * Cleanups and test fix * Encapsulate approval logic in user service and log approval changes * Send follow up "Account approved" email Closes #5656. * Add notification for admins * Fix creating a user via the admin view * Update list: Unify flags into status column, add approve action * Adjust "Resend email" wording * Incorporate feedback from code review * Remove duplicate test server policy reset --------- Co-authored-by: Nicolas Dorier <nicolas.dorier@gmail.com>
92 lines
3.9 KiB
C#
92 lines
3.9 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Security.Claims;
|
|
using System.Text;
|
|
using System.Text.Encodings.Web;
|
|
using System.Threading.Tasks;
|
|
using BTCPayServer.Client;
|
|
using BTCPayServer.Data;
|
|
using BTCPayServer.Services;
|
|
using Microsoft.AspNetCore.Authentication;
|
|
using Microsoft.AspNetCore.Identity;
|
|
using Microsoft.EntityFrameworkCore;
|
|
using Microsoft.Extensions.Logging;
|
|
using Microsoft.Extensions.Options;
|
|
|
|
namespace BTCPayServer.Security.Greenfield
|
|
{
|
|
public class BasicAuthenticationHandler : AuthenticationHandler<GreenfieldAuthenticationOptions>
|
|
{
|
|
private readonly IOptionsMonitor<IdentityOptions> _identityOptions;
|
|
private readonly SignInManager<ApplicationUser> _signInManager;
|
|
private readonly UserManager<ApplicationUser> _userManager;
|
|
|
|
public BasicAuthenticationHandler(
|
|
IOptionsMonitor<IdentityOptions> identityOptions,
|
|
IOptionsMonitor<GreenfieldAuthenticationOptions> options,
|
|
ILoggerFactory logger,
|
|
UrlEncoder encoder,
|
|
SignInManager<ApplicationUser> signInManager,
|
|
UserManager<ApplicationUser> userManager) : base(options, logger, encoder)
|
|
{
|
|
_identityOptions = identityOptions;
|
|
_signInManager = signInManager;
|
|
_userManager = userManager;
|
|
}
|
|
|
|
protected override async Task<AuthenticateResult> HandleAuthenticateAsync()
|
|
{
|
|
string authHeader = Context.Request.Headers["Authorization"];
|
|
|
|
if (authHeader == null || !authHeader.StartsWith("Basic ", StringComparison.OrdinalIgnoreCase))
|
|
return AuthenticateResult.NoResult();
|
|
string password;
|
|
string username;
|
|
try
|
|
{
|
|
var encodedUsernamePassword =
|
|
authHeader.Split(' ', 2, StringSplitOptions.RemoveEmptyEntries)[1]?.Trim();
|
|
var decodedUsernamePassword =
|
|
Encoding.UTF8.GetString(Convert.FromBase64String(encodedUsernamePassword)).Split(':');
|
|
username = decodedUsernamePassword[0];
|
|
password = decodedUsernamePassword[1];
|
|
}
|
|
catch (Exception)
|
|
{
|
|
return AuthenticateResult.Fail(
|
|
"Basic authentication header was not in a correct format. (username:password encoded in base64)");
|
|
}
|
|
|
|
var result = await _signInManager.PasswordSignInAsync(username, password, true, true);
|
|
if (!result.Succeeded)
|
|
return AuthenticateResult.Fail(result.ToString());
|
|
|
|
var user = await _userManager.Users
|
|
.Include(applicationUser => applicationUser.Fido2Credentials)
|
|
.FirstOrDefaultAsync(applicationUser =>
|
|
applicationUser.NormalizedUserName == _userManager.NormalizeName(username));
|
|
|
|
if (!UserService.TryCanLogin(user, out var error))
|
|
{
|
|
return AuthenticateResult.Fail($"Basic authentication failed: {error}");
|
|
}
|
|
if (user.Fido2Credentials.Any())
|
|
{
|
|
return AuthenticateResult.Fail("Cannot use Basic authentication with multi-factor is enabled.");
|
|
}
|
|
var claims = new List<Claim>()
|
|
{
|
|
new Claim(_identityOptions.CurrentValue.ClaimsIdentity.UserIdClaimType, user.Id),
|
|
new Claim(GreenfieldConstants.ClaimTypes.Permission,
|
|
Permission.Create(Policies.Unrestricted).ToString())
|
|
};
|
|
claims.AddRange((await _userManager.GetRolesAsync(user)).Select(s => new Claim(_identityOptions.CurrentValue.ClaimsIdentity.RoleClaimType, s)));
|
|
|
|
return AuthenticateResult.Success(new AuthenticationTicket(
|
|
new ClaimsPrincipal(new ClaimsIdentity(claims, GreenfieldConstants.AuthenticationType)),
|
|
GreenfieldConstants.AuthenticationType));
|
|
}
|
|
}
|
|
}
|