Add cookie/JWT-based authentication and user context headers
Introduce a new authentication mechanism using JWT tokens stored in cookies, with a custom CookieAuthHandler for API request authentication. Add AuthServiceSettings for configuration and UserHeaderHandler to propagate user context in outgoing HTTP requests. Update service registrations and configuration files to support the new authentication flow. Refactor CurrentUserService for simplicity. This enables stateless, cookie-based authentication and consistent user context across API calls.
This commit is contained in:
@@ -8,6 +8,7 @@ using DbFirst.Infrastructure;
|
||||
using DevExpress.AspNetCore;
|
||||
using DevExpress.DashboardAspNetCore;
|
||||
using DevExpress.DashboardWeb;
|
||||
using Microsoft.AspNetCore.Authentication;
|
||||
|
||||
var builder = WebApplication.CreateBuilder(args);
|
||||
|
||||
@@ -47,6 +48,11 @@ builder.Services.AddCors(options =>
|
||||
builder.Services.AddInfrastructure(builder.Configuration);
|
||||
builder.Services.AddApplication();
|
||||
|
||||
builder.Services.Configure<AuthServiceSettings>(
|
||||
builder.Configuration.GetSection("AuthService"));
|
||||
builder.Services.AddAuthentication("CookieAuth")
|
||||
.AddScheme<AuthenticationSchemeOptions, CookieAuthHandler>("CookieAuth", _ => { });
|
||||
|
||||
builder.Services.AddDevExpressControls();
|
||||
builder.Services.AddSignalR();
|
||||
builder.Services.AddSingleton<IDashboardChangeNotifier, DashboardChangeNotifier>();
|
||||
|
||||
10
DbFirst.API/Services/AuthServiceSettings.cs
Normal file
10
DbFirst.API/Services/AuthServiceSettings.cs
Normal file
@@ -0,0 +1,10 @@
|
||||
namespace DbFirst.API.Services
|
||||
{
|
||||
public class AuthServiceSettings
|
||||
{
|
||||
public string BaseUrl { get; set; } = string.Empty;
|
||||
public string Login { get; set; } = string.Empty;
|
||||
public string Logout { get; set; } = string.Empty;
|
||||
public string Check { get; set; } = string.Empty;
|
||||
}
|
||||
}
|
||||
112
DbFirst.API/Services/CookieAuthHandler.cs
Normal file
112
DbFirst.API/Services/CookieAuthHandler.cs
Normal file
@@ -0,0 +1,112 @@
|
||||
using Microsoft.AspNetCore.Authentication;
|
||||
using Microsoft.Extensions.Options;
|
||||
using System.Security.Claims;
|
||||
using System.Text;
|
||||
using System.Text.Json;
|
||||
|
||||
namespace DbFirst.API.Services;
|
||||
|
||||
/// <summary>
|
||||
/// Authentifiziert eingehende API-Requests anhand des JWT-Tokens im Cookie.
|
||||
/// Das Token wird lokal dekodiert – ohne Rückruf zum Auth-Service – da es
|
||||
/// self-contained ist (Claim "unique_name" enthält den Benutzernamen).
|
||||
/// </summary>
|
||||
public class CookieAuthHandler(
|
||||
IOptionsMonitor<AuthenticationSchemeOptions> options,
|
||||
ILoggerFactory logger,
|
||||
System.Text.Encodings.Web.UrlEncoder encoder)
|
||||
: AuthenticationHandler<AuthenticationSchemeOptions>(options, logger, encoder)
|
||||
{
|
||||
protected override Task<AuthenticateResult> HandleAuthenticateAsync()
|
||||
{
|
||||
var log = logger.CreateLogger<CookieAuthHandler>();
|
||||
|
||||
// 1. Cookie-Header lesen
|
||||
var cookieHeader = Request.Headers.Cookie.ToString();
|
||||
if (string.IsNullOrEmpty(cookieHeader))
|
||||
{
|
||||
log.LogDebug("CookieAuthHandler: Kein Cookie-Header vorhanden.");
|
||||
return Task.FromResult(AuthenticateResult.Fail("Kein Cookie vorhanden."));
|
||||
}
|
||||
|
||||
// 2. JWT aus dem "AuthToken"-Cookie extrahieren und Benutzernamen dekodieren
|
||||
var userName = TryExtractUserNameFromCookieJwt(cookieHeader);
|
||||
|
||||
// 3. Fallback: X-Authenticated-User-Header
|
||||
if (string.IsNullOrEmpty(userName))
|
||||
userName = Request.Headers["X-Authenticated-User"].ToString();
|
||||
|
||||
if (string.IsNullOrEmpty(userName))
|
||||
{
|
||||
log.LogDebug("CookieAuthHandler: Kein Benutzername aus Token oder Header ermittelbar.");
|
||||
return Task.FromResult(AuthenticateResult.Fail("Kein Benutzername ermittelbar."));
|
||||
}
|
||||
|
||||
log.LogDebug("CookieAuthHandler: Authentifizierung erfolgreich für '{User}'.", userName);
|
||||
|
||||
var claims = new[] { new Claim(ClaimTypes.Name, userName) };
|
||||
var identity = new ClaimsIdentity(claims, Scheme.Name);
|
||||
var principal = new ClaimsPrincipal(identity);
|
||||
var ticket = new AuthenticationTicket(principal, Scheme.Name);
|
||||
|
||||
return Task.FromResult(AuthenticateResult.Success(ticket));
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Liest den "AuthToken"-Wert aus dem Cookie-Header und extrahiert
|
||||
/// den "unique_name"-Claim aus dem JWT-Payload (Base64Url-dekodiert).
|
||||
/// Keine Signaturprüfung – das Token wurde bereits beim Login/Restore
|
||||
/// durch den Auth-Service validiert.
|
||||
/// </summary>
|
||||
private static string? TryExtractUserNameFromCookieJwt(string cookieHeader)
|
||||
{
|
||||
foreach (var segment in cookieHeader.Split(';', StringSplitOptions.TrimEntries | StringSplitOptions.RemoveEmptyEntries))
|
||||
{
|
||||
var eqIdx = segment.IndexOf('=');
|
||||
if (eqIdx < 0) continue;
|
||||
|
||||
var name = segment[..eqIdx].Trim();
|
||||
if (!name.Equals("AuthToken", StringComparison.OrdinalIgnoreCase))
|
||||
continue;
|
||||
|
||||
var token = segment[(eqIdx + 1)..].Trim();
|
||||
return DecodeJwtClaim(token, "unique_name");
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
/// <summary>
|
||||
/// Dekodiert den Payload-Teil eines JWT (Base64Url) und gibt den Wert
|
||||
/// des angegebenen Claims zurück.
|
||||
/// </summary>
|
||||
private static string? DecodeJwtClaim(string jwt, string claimName)
|
||||
{
|
||||
try
|
||||
{
|
||||
var parts = jwt.Split('.');
|
||||
if (parts.Length != 3) return null;
|
||||
|
||||
// Base64Url → Base64 → bytes → UTF-8 string
|
||||
var base64 = parts[1].Replace('-', '+').Replace('_', '/');
|
||||
base64 = (base64.Length % 4) switch
|
||||
{
|
||||
2 => base64 + "==",
|
||||
3 => base64 + "=",
|
||||
_ => base64
|
||||
};
|
||||
|
||||
var payloadJson = Encoding.UTF8.GetString(Convert.FromBase64String(base64));
|
||||
|
||||
using var doc = JsonDocument.Parse(payloadJson);
|
||||
if (doc.RootElement.TryGetProperty(claimName, out var prop))
|
||||
return prop.GetString();
|
||||
}
|
||||
catch
|
||||
{
|
||||
// Fehlerhafte Token stillschweigend ignorieren
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
}
|
||||
@@ -1,10 +1,9 @@
|
||||
using DbFirst.Application.Abstractions;
|
||||
|
||||
namespace DbFirst.API.Services
|
||||
namespace DbFirst.API.Services;
|
||||
|
||||
public class CurrentUserService(IHttpContextAccessor httpContextAccessor) : ICurrentUserService
|
||||
{
|
||||
public class CurrentUserService(IHttpContextAccessor httpContextAccessor) : ICurrentUserService
|
||||
{
|
||||
public string UserName =>
|
||||
httpContextAccessor.HttpContext?.User.Identity?.Name ?? "unknown";
|
||||
}
|
||||
public string UserName =>
|
||||
httpContextAccessor.HttpContext?.User.Identity?.Name ?? "unknown";
|
||||
}
|
||||
|
||||
@@ -2,7 +2,31 @@
|
||||
"Logging": {
|
||||
"LogLevel": {
|
||||
"Default": "Information",
|
||||
"Microsoft.AspNetCore": "Warning"
|
||||
"Microsoft.AspNetCore": "Warning",
|
||||
"DbFirst.API.Services.CookieAuthHandler": "Debug"
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"AuthService": {
|
||||
"BaseUrl": "http://172.24.12.39:9090/",
|
||||
"Login": "api/Auth/db-first/login",
|
||||
"Logout": "api/Auth/logout",
|
||||
"Check": "api/Auth/check"
|
||||
},
|
||||
"ConnectionStrings": {
|
||||
"DefaultConnection": "Server=SDD-VMP04-SQL17\\DD_DEVELOP01;Database=DD_ECM;User Id=sa;Password=dd;TrustServerCertificate=True;",
|
||||
"MassDataConnection": "Server=SDD-VMP04-SQL19\\DD_DEVELOP01;Database=DD_ECM;User Id=sa;Password=dd;TrustServerCertificate=True;"
|
||||
},
|
||||
"Cors": {
|
||||
"AllowedOrigins": [
|
||||
"https://localhost:7276",
|
||||
"http://localhost:5101"
|
||||
]
|
||||
},
|
||||
"Dashboard": {
|
||||
"BaseUrl": "https://localhost:7204"
|
||||
},
|
||||
"BrowserLink": {
|
||||
"Enabled": false
|
||||
},
|
||||
"DetailedErrors": true
|
||||
}
|
||||
@@ -1,34 +1,25 @@
|
||||
{
|
||||
"ConnectionStrings": {
|
||||
"DefaultConnection": "Server=SDD-VMP04-SQL17\\DD_DEVELOP01;Database=DD_ECM;User Id=sa;Password=dd;TrustServerCertificate=True;",
|
||||
"MassDataConnection": "Server=SDD-VMP04-SQL19\\DD_DEVELOP01;Database=DD_ECM;User Id=sa;Password=dd;TrustServerCertificate=True;"
|
||||
},
|
||||
"Dashboard": {
|
||||
"BaseUrl": "https://localhost:7204"
|
||||
},
|
||||
"Cors": {
|
||||
"AllowedOrigins": [
|
||||
"https://localhost:7276",
|
||||
"http://localhost:5101"
|
||||
]
|
||||
},
|
||||
"TableConfigurations": {
|
||||
"VwmyCatalog": {
|
||||
"ViewName": "VWMY_CATALOG",
|
||||
"GuidColumnName": "GUID",
|
||||
"CatTitleColumnName": "CAT_TITLE",
|
||||
"CatStringColumnName": "CAT_STRING",
|
||||
"AddedWhoColumnName": "ADDED_WHO",
|
||||
"AddedWhenColumnName": "ADDED_WHEN",
|
||||
"ChangedWhoColumnName": "CHANGED_WHO",
|
||||
"ChangedWhenColumnName": "CHANGED_WHEN"
|
||||
}
|
||||
},
|
||||
"Logging": {
|
||||
"LogLevel": {
|
||||
"Default": "Information",
|
||||
"Microsoft.AspNetCore": "Warning"
|
||||
}
|
||||
},
|
||||
"AllowedHosts": "*"
|
||||
}
|
||||
"AllowedHosts": "*",
|
||||
"AuthService": {
|
||||
"BaseUrl": null,
|
||||
"Login": "api/Auth/db-first/login",
|
||||
"Logout": "api/Auth/logout",
|
||||
"Check": "api/Auth/check"
|
||||
},
|
||||
"ConnectionStrings": {
|
||||
"DefaultConnection": null,
|
||||
"MassDataConnection": null
|
||||
},
|
||||
"Cors": {
|
||||
"AllowedOrigins": []
|
||||
},
|
||||
"Dashboard": {
|
||||
"BaseUrl": null
|
||||
}
|
||||
}
|
||||
@@ -21,7 +21,18 @@ var appSettings = builder.Configuration.Get<AppSettings>() ?? new AppSettings();
|
||||
|
||||
// Alle API-Clients teilen sich denselben scoped CookieContainer (pro Blazor-Circuit),
|
||||
// damit das Auth-Cookie nach dem Login automatisch an alle Folgeanfragen angehängt wird.
|
||||
static HttpClient CreateHttpClientWithCookies(CookieContainer cookieContainer, string? baseUrl)
|
||||
// Der UserHeaderHandler ergänzt automatisch den X-Authenticated-User-Header.
|
||||
static HttpClient CreateApiHttpClient(CookieContainer cookieContainer, AuthService authService, string? baseUrl)
|
||||
{
|
||||
var inner = new HttpClientHandler { UseCookies = false };
|
||||
var handler = new UserHeaderHandler(authService) { InnerHandler = inner };
|
||||
var client = new HttpClient(handler);
|
||||
if (!string.IsNullOrWhiteSpace(baseUrl))
|
||||
client.BaseAddress = new Uri(baseUrl);
|
||||
return client;
|
||||
}
|
||||
|
||||
static HttpClient CreateAuthHttpClient(CookieContainer cookieContainer, string? baseUrl)
|
||||
{
|
||||
var handler = new HttpClientHandler { CookieContainer = cookieContainer, UseCookies = true };
|
||||
var client = new HttpClient(handler);
|
||||
@@ -36,7 +47,7 @@ builder.Services.AddScoped<IAuthApiClient>(sp =>
|
||||
var authBaseUrl = !string.IsNullOrWhiteSpace(appSettings.AuthService.BaseUrl)
|
||||
? appSettings.AuthService.BaseUrl
|
||||
: appSettings.BaseUrl;
|
||||
var client = CreateHttpClientWithCookies(cc, authBaseUrl);
|
||||
var client = CreateAuthHttpClient(cc, authBaseUrl);
|
||||
return new AuthApiClient(client, sp.GetRequiredService<AuthService>(), cc);
|
||||
});
|
||||
|
||||
@@ -45,16 +56,28 @@ var apiDefaultUrl = !string.IsNullOrWhiteSpace(appSettings.ApiDefaultUrl)
|
||||
: appSettings.BaseUrl;
|
||||
|
||||
builder.Services.AddScoped<ICatalogApiClient>(sp =>
|
||||
new CatalogApiClient(CreateHttpClientWithCookies(sp.GetRequiredService<CookieContainer>(), apiDefaultUrl)));
|
||||
new CatalogApiClient(CreateApiHttpClient(
|
||||
sp.GetRequiredService<CookieContainer>(),
|
||||
sp.GetRequiredService<AuthService>(),
|
||||
apiDefaultUrl)));
|
||||
|
||||
builder.Services.AddScoped<IDashboardApiClient>(sp =>
|
||||
new DashboardApiClient(CreateHttpClientWithCookies(sp.GetRequiredService<CookieContainer>(), apiDefaultUrl)));
|
||||
new DashboardApiClient(CreateApiHttpClient(
|
||||
sp.GetRequiredService<CookieContainer>(),
|
||||
sp.GetRequiredService<AuthService>(),
|
||||
apiDefaultUrl)));
|
||||
|
||||
builder.Services.AddScoped<IMassDataApiClient>(sp =>
|
||||
new MassDataApiClient(CreateHttpClientWithCookies(sp.GetRequiredService<CookieContainer>(), apiDefaultUrl)));
|
||||
new MassDataApiClient(CreateApiHttpClient(
|
||||
sp.GetRequiredService<CookieContainer>(),
|
||||
sp.GetRequiredService<AuthService>(),
|
||||
apiDefaultUrl)));
|
||||
|
||||
builder.Services.AddScoped<ILayoutApiClient>(sp =>
|
||||
new LayoutApiClient(CreateHttpClientWithCookies(sp.GetRequiredService<CookieContainer>(), apiDefaultUrl)));
|
||||
new LayoutApiClient(CreateApiHttpClient(
|
||||
sp.GetRequiredService<CookieContainer>(),
|
||||
sp.GetRequiredService<AuthService>(),
|
||||
apiDefaultUrl)));
|
||||
|
||||
var app = builder.Build();
|
||||
|
||||
|
||||
17
DbFirst.BlazorWebApp/Services/UserHeaderHandler.cs
Normal file
17
DbFirst.BlazorWebApp/Services/UserHeaderHandler.cs
Normal file
@@ -0,0 +1,17 @@
|
||||
namespace DbFirst.BlazorWebApp.Services;
|
||||
|
||||
public class UserHeaderHandler(AuthService authService) : DelegatingHandler
|
||||
{
|
||||
protected override Task<HttpResponseMessage> SendAsync(
|
||||
HttpRequestMessage request, CancellationToken cancellationToken)
|
||||
{
|
||||
if (authService.IsAuthenticated)
|
||||
{
|
||||
request.Headers.TryAddWithoutValidation("X-Authenticated-User", authService.UserName);
|
||||
if (!string.IsNullOrEmpty(authService.RawCookieHeader))
|
||||
request.Headers.TryAddWithoutValidation("Cookie", authService.RawCookieHeader);
|
||||
}
|
||||
|
||||
return base.SendAsync(request, cancellationToken);
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user