|
2 | 2 | // Licensed under the MIT License. See LICENSE file in the project root for license information. |
3 | 3 |
|
4 | 4 | using AspNetCore.Authentication.ApiKey.Tests.Infrastructure; |
| 5 | +using Microsoft.AspNetCore.Authorization; |
| 6 | +using Microsoft.Extensions.DependencyInjection; |
5 | 7 | using System; |
| 8 | +using System.Collections.Generic; |
| 9 | +using System.Linq; |
6 | 10 | using System.Net; |
7 | 11 | using System.Net.Http; |
| 12 | +using System.Net.Http.Headers; |
| 13 | +using System.Security.Claims; |
8 | 14 | using System.Text.Json; |
9 | 15 | using System.Threading.Tasks; |
10 | 16 | using Xunit; |
@@ -389,11 +395,127 @@ public async Task HandleAuthenticate_OnAuthenticationSucceeded_result_not_null() |
389 | 395 | Assert.Equal(HttpStatusCode.Unauthorized, response.StatusCode); |
390 | 396 | } |
391 | 397 |
|
392 | | - #endregion // HandleAuthenticate |
| 398 | + #endregion // HandleAuthenticate |
393 | 399 |
|
394 | | - private async Task<ClaimsPrincipalDto> DeserializeClaimsPrincipalAsync(HttpResponseMessage response) |
| 400 | + #region Multi-Scheme |
| 401 | + |
| 402 | + [Fact] |
| 403 | + public async Task MultiScheme() |
| 404 | + { |
| 405 | + var keyName1 = "Key1"; |
| 406 | + var keyName2 = "Key2"; |
| 407 | + var keyName3 = "Key3"; |
| 408 | + var keyName4 = "Key4"; |
| 409 | + var claimProvider1 = new ClaimDto { Type = "Provider", Value = "1" }; |
| 410 | + var claimProvider2 = new ClaimDto { Type = "Provider", Value = "2" }; |
| 411 | + var claimRole = new ClaimDto(FakeApiKeys.FakeRoleClaim); |
| 412 | + var schemes = new List<string> { "InHeader", "InHeaderWithProvider", "InAuthorizationHeader", "InQueryParams" }; |
| 413 | + |
| 414 | + using var server = TestServerBuilder.BuildTestServer(services => |
| 415 | + { |
| 416 | + services.AddAuthentication("InHeader") |
| 417 | + .AddApiKeyInHeader("InHeader", options => |
| 418 | + { |
| 419 | + options.Realm = TestServerBuilder.Realm; |
| 420 | + options.KeyName = keyName1; |
| 421 | + options.Events.OnValidateKey = context => |
| 422 | + { |
| 423 | + context.Response.Headers.Add("X-Custom", "InHeader Scheme"); |
| 424 | + context.ValidationSucceeded(); |
| 425 | + return Task.CompletedTask; |
| 426 | + }; |
| 427 | + }) |
| 428 | + .AddApiKeyInHeader<FakeApiKeyProviderLocal_1>("InHeaderWithProvider", options => |
| 429 | + { |
| 430 | + options.Realm = TestServerBuilder.Realm; |
| 431 | + options.KeyName = keyName2; |
| 432 | + }) |
| 433 | + .AddApiKeyInAuthorizationHeader<FakeApiKeyProviderLocal_2>("InAuthorizationHeader", options => |
| 434 | + { |
| 435 | + options.Realm = TestServerBuilder.Realm; |
| 436 | + options.KeyName = keyName3; |
| 437 | + }) |
| 438 | + .AddApiKeyInQueryParams<FakeApiKeyProvider>("InQueryParams", options => |
| 439 | + { |
| 440 | + options.Realm = TestServerBuilder.Realm; |
| 441 | + options.KeyName = keyName4; |
| 442 | + }); |
| 443 | + |
| 444 | +#if !(NET461 || NETSTANDARD2_0 || NETCOREAPP2_1) |
| 445 | + services.Configure<AuthorizationOptions>(options => options.FallbackPolicy = new AuthorizationPolicyBuilder(schemes.ToArray()).RequireAuthenticatedUser().Build()); |
| 446 | +#endif |
| 447 | + }); |
| 448 | + |
| 449 | + using var client = server.CreateClient(); |
| 450 | + |
| 451 | + using var request1 = new HttpRequestMessage(HttpMethod.Get, TestServerBuilder.ClaimsPrincipalUrl + "?scheme=" + schemes[0]); |
| 452 | + request1.Headers.Add(keyName1, FakeApiKeys.FakeKey); |
| 453 | + using var response1 = await client.SendAsync(request1); |
| 454 | + Assert.True(response1.IsSuccessStatusCode); |
| 455 | + Assert.Equal(HttpStatusCode.OK, response1.StatusCode); |
| 456 | + var response1Principal = await DeserializeClaimsPrincipalAsync(response1); |
| 457 | + Assert.Contains(response1.Headers, r => r.Key == "X-Custom" && r.Value.Any(v => v == "InHeader Scheme")); |
| 458 | + Assert.DoesNotContain(response1Principal.Claims, c => c.Type == claimProvider1.Type && c.Value == claimProvider1.Value); |
| 459 | + Assert.DoesNotContain(response1Principal.Claims, c => c.Type == claimProvider2.Type && c.Value == claimProvider2.Value); |
| 460 | + Assert.DoesNotContain(response1Principal.Claims, c => c.Type == claimRole.Type && c.Value == claimRole.Value); |
| 461 | + |
| 462 | + |
| 463 | + using var request2 = new HttpRequestMessage(HttpMethod.Get, TestServerBuilder.ClaimsPrincipalUrl + "?scheme=" + schemes[1]); |
| 464 | + request2.Headers.Add(keyName2, FakeApiKeys.FakeKey); |
| 465 | + using var response2 = await client.SendAsync(request2); |
| 466 | + Assert.True(response2.IsSuccessStatusCode); |
| 467 | + Assert.Equal(HttpStatusCode.OK, response2.StatusCode); |
| 468 | + var response2Principal = await DeserializeClaimsPrincipalAsync(response2); |
| 469 | + Assert.DoesNotContain(response2.Headers, r => r.Key == "X-Custom" && r.Value.Any(v => v == "InHeader Scheme")); |
| 470 | + Assert.Contains(response2Principal.Claims, c => c.Type == claimProvider1.Type && c.Value == claimProvider1.Value); |
| 471 | + Assert.DoesNotContain(response2Principal.Claims, c => c.Type == claimProvider2.Type && c.Value == claimProvider2.Value); |
| 472 | + Assert.DoesNotContain(response2Principal.Claims, c => c.Type == claimRole.Type && c.Value == claimRole.Value); |
| 473 | + |
| 474 | + |
| 475 | + using var request3 = new HttpRequestMessage(HttpMethod.Get, TestServerBuilder.ClaimsPrincipalUrl + "?scheme=" + schemes[2]); |
| 476 | + request3.Headers.Authorization = new AuthenticationHeaderValue(keyName3, FakeApiKeys.FakeKey); |
| 477 | + using var response3 = await client.SendAsync(request3); |
| 478 | + Assert.True(response3.IsSuccessStatusCode); |
| 479 | + Assert.Equal(HttpStatusCode.OK, response3.StatusCode); |
| 480 | + var response3Principal = await DeserializeClaimsPrincipalAsync(response3); |
| 481 | + Assert.DoesNotContain(response3.Headers, r => r.Key == "X-Custom" && r.Value.Any(v => v == "InHeader Scheme")); |
| 482 | + Assert.DoesNotContain(response3Principal.Claims, c => c.Type == claimProvider1.Type && c.Value == claimProvider1.Value); |
| 483 | + Assert.Contains(response3Principal.Claims, c => c.Type == claimProvider2.Type && c.Value == claimProvider2.Value); |
| 484 | + Assert.DoesNotContain(response3Principal.Claims, c => c.Type == claimRole.Type && c.Value == claimRole.Value); |
| 485 | + |
| 486 | + |
| 487 | + using var request4 = new HttpRequestMessage(HttpMethod.Get, $"{TestServerBuilder.ClaimsPrincipalUrl}?scheme={schemes[3]}&{keyName4}={FakeApiKeys.FakeKey}"); |
| 488 | + using var response4 = await client.SendAsync(request4); |
| 489 | + Assert.True(response4.IsSuccessStatusCode); |
| 490 | + Assert.Equal(HttpStatusCode.OK, response3.StatusCode); |
| 491 | + var response4Principal = await DeserializeClaimsPrincipalAsync(response4); |
| 492 | + Assert.DoesNotContain(response4.Headers, r => r.Key == "X-Custom" && r.Value.Any(v => v == "InHeader Scheme")); |
| 493 | + Assert.DoesNotContain(response4Principal.Claims, c => c.Type == claimProvider1.Type && c.Value == claimProvider1.Value); |
| 494 | + Assert.DoesNotContain(response4Principal.Claims, c => c.Type == claimProvider2.Type && c.Value == claimProvider2.Value); |
| 495 | + Assert.Contains(response4Principal.Claims, c => c.Type == claimRole.Type && c.Value == claimRole.Value); |
| 496 | + } |
| 497 | + |
| 498 | + #endregion // Multi-Scheme |
| 499 | + |
| 500 | + private async Task<ClaimsPrincipalDto> DeserializeClaimsPrincipalAsync(HttpResponseMessage response) |
395 | 501 | { |
396 | 502 | return JsonSerializer.Deserialize<ClaimsPrincipalDto>(await response.Content.ReadAsStringAsync()); |
397 | 503 | } |
| 504 | + |
| 505 | + private class FakeApiKeyProviderLocal_1 : IApiKeyProvider |
| 506 | + { |
| 507 | + public Task<IApiKey> ProvideAsync(string key) |
| 508 | + { |
| 509 | + return Task.FromResult((IApiKey)new FakeApiKey(key, "Test", new List<Claim> { new Claim("Provider", "1") })); |
| 510 | + } |
| 511 | + } |
| 512 | + |
| 513 | + private class FakeApiKeyProviderLocal_2 : IApiKeyProvider |
| 514 | + { |
| 515 | + public Task<IApiKey> ProvideAsync(string key) |
| 516 | + { |
| 517 | + return Task.FromResult((IApiKey)new FakeApiKey(key, "Test", new List<Claim> { new Claim("Provider", "2") })); |
| 518 | + } |
| 519 | + } |
398 | 520 | } |
399 | 521 | } |
0 commit comments