Skip to content

Commit bc1ba12

Browse files
authored
Add AuthenticationSchemes option (#59)
1 parent 8ba2049 commit bc1ba12

File tree

7 files changed

+286
-4
lines changed

7 files changed

+286
-4
lines changed

README.md

+91
Original file line numberDiff line numberDiff line change
@@ -306,6 +306,97 @@ Similarly for unions, validation occurs on the exact type that is queried. Be s
306306
consider placement of authorization rules when using interfaces and unions, especially when some
307307
fields are marked with `AllowAnonymous`.
308308

309+
#### Custom authentication configuration for GET/POST requests
310+
311+
To provide custom authentication code, bypassing ASP.NET Core's authentication, derive from the
312+
`GraphQLHttpMiddleware<T>` class and override `HandleAuthorizeAsync`, setting `HttpContext.User`
313+
to an appropriate `ClaimsPrincipal` instance.
314+
315+
See 'Customizing middleware behavior' below for an example of deriving from `GraphQLHttpMiddleware`.
316+
317+
#### Authentication for WebSocket requests
318+
319+
Since WebSocket requests from browsers cannot typically carry a HTTP Authorization header, you
320+
will need to authorize requests via the `ConnectionInit` WebSocket message or carry the authorization
321+
token within the URL. Below is a sample of the former:
322+
323+
```cs
324+
builder.Services.AddGraphQL(b => b
325+
.AddAutoSchema<Query>()
326+
.AddSystemTextJson()
327+
.AddAuthorizationRule() // not required for endpoint authorization
328+
.AddWebSocketAuthentication<MyAuthService>());
329+
330+
app.UseGraphQL("/graphql", config =>
331+
{
332+
// require that the user be authenticated
333+
config.AuthorizationRequired = true;
334+
});
335+
336+
class MyAuthService : IWebSocketAuthenticationService
337+
{
338+
private readonly IGraphQLSerializer _serializer;
339+
340+
public MyAuthService(IGraphQLSerializer serializer)
341+
{
342+
_serializer = serializer;
343+
}
344+
345+
public async ValueTask<bool> AuthenticateAsync(IWebSocketConnection connection, OperationMessage operationMessage)
346+
{
347+
// read payload of ConnectionInit message and look for an "Authorization" entry that starts with "Bearer "
348+
var payload = _serializer.ReadNode<Inputs>(operationMessage.Payload);
349+
if ((payload?.TryGetValue("Authorization", out var value) ?? false) && value is string valueString)
350+
{
351+
var user = ParseToken(valueString);
352+
if (user != null)
353+
{
354+
// set user and indicate authentication was successful
355+
connection.HttpContext.User = user;
356+
return true;
357+
}
358+
}
359+
return false; // authentication failed
360+
}
361+
362+
private ClaimsPrincipal? ParseToken(string authorizationHeaderValue)
363+
{
364+
// parse header value and return user, or null if unable
365+
}
366+
}
367+
```
368+
369+
To authorize based on information within the query string, it is recommended to
370+
derive from `GraphQLHttpMiddleware<T>` and override `InvokeAsync`, setting
371+
`HttpContext.User` based on the query string parameters, and then calling `base.InvokeAsync`.
372+
Alternatively you may override `HandleAuthorizeAsync` which will execute for GET/POST requests,
373+
and `HandleAuthorizeWebSocketConnectionAsync` for WebSocket requests.
374+
Note that `InvokeAsync` will execute even if the protocol is disabled in the options via
375+
disabling `HandleGet` or similar; `HandleAuthorizeAsync` and `HandleAuthorizeWebSocketConnectionAsync`
376+
will not.
377+
378+
#### Authentication schemes
379+
380+
By default the role and policy requirements are validated against the current user as defined by
381+
`HttpContext.User`. This is typically set by ASP.NET Core's authentication middleware and is based
382+
on the default authentication scheme set during the call to `AddAuthentication` in `Startup.cs`.
383+
You may override this behavior by specifying a different authentication scheme via the `AuthenticationSchemes`
384+
option. For instance, if you wish to authenticate using JWT authentication when Cookie authentication is
385+
the default, you may specify the scheme as follows:
386+
387+
```csharp
388+
app.UseGraphQL("/graphql", config =>
389+
{
390+
// specify a specific authentication scheme to use
391+
config.AuthenticationSchemes.Add(JwtBearerDefaults.AuthenticationScheme);
392+
});
393+
```
394+
395+
This will overwrite the `HttpContext.User` property when handling GraphQL requests, which will in turn
396+
set the `IResolveFieldContext.User` property to the same value (unless being overridden via an
397+
`IWebSocketAuthenticationService` implementation as shown above). So both endpoint authorization and
398+
field authorization will perform role and policy checks against the same authentication scheme.
399+
309400
### UI configuration
310401

311402
This project does not include user interfaces, such as GraphiQL or Playground,

src/GraphQL.AspNetCore3/GraphQLHttpMiddleware.cs

+26-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
#pragma warning disable CA1716 // Identifiers should not match keywords
22

3+
using System.Security.Claims;
4+
using Microsoft.AspNetCore.Authentication;
35
using Microsoft.AspNetCore.Authorization;
46

57
namespace GraphQL.AspNetCore3;
@@ -230,6 +232,8 @@ public virtual async Task InvokeAsync(HttpContext context)
230232
/// </summary>
231233
protected virtual async ValueTask<bool> HandleAuthorizeAsync(HttpContext context, RequestDelegate next)
232234
{
235+
await SetHttpContextUserAsync(context);
236+
233237
var success = await AuthorizationHelper.AuthorizeAsync(
234238
new AuthorizationParameters<(GraphQLHttpMiddleware Middleware, HttpContext Context, RequestDelegate Next)>(
235239
context,
@@ -242,6 +246,23 @@ protected virtual async ValueTask<bool> HandleAuthorizeAsync(HttpContext context
242246
return !success;
243247
}
244248

249+
/// <summary>
250+
/// If any authentication schemes are defined, set the <see cref="HttpContext.User"/> property.
251+
/// </summary>
252+
private async ValueTask SetHttpContextUserAsync(HttpContext context)
253+
{
254+
if (_options.AuthenticationSchemes.Count > 0) {
255+
ClaimsPrincipal? newPrincipal = null;
256+
foreach (var scheme in _options.AuthenticationSchemes) {
257+
var result = await context.AuthenticateAsync(scheme);
258+
if (result != null && result.Succeeded) {
259+
newPrincipal = SecurityHelper.MergeUserPrincipal(newPrincipal, result.Principal);
260+
}
261+
}
262+
context.User = newPrincipal ?? new ClaimsPrincipal(new ClaimsIdentity());
263+
}
264+
}
265+
245266
/// <summary>
246267
/// Perform authorization, if required, and return <see langword="true"/> if the
247268
/// request was handled (typically by returning an error message). If <see langword="false"/>
@@ -251,8 +272,11 @@ protected virtual async ValueTask<bool> HandleAuthorizeAsync(HttpContext context
251272
/// the WebSocket connection during the ConnectionInit message. Authorization checks for
252273
/// WebSocket connections occur then, after authorization has taken place.
253274
/// </summary>
254-
protected virtual ValueTask<bool> HandleAuthorizeWebSocketConnectionAsync(HttpContext context, RequestDelegate next)
255-
=> new(false);
275+
protected virtual async ValueTask<bool> HandleAuthorizeWebSocketConnectionAsync(HttpContext context, RequestDelegate next)
276+
{
277+
await SetHttpContextUserAsync(context);
278+
return false;
279+
}
256280

257281
/// <summary>
258282
/// Handles a single GraphQL request.

src/GraphQL.AspNetCore3/GraphQLHttpMiddlewareOptions.cs

+6
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,12 @@ public class GraphQLHttpMiddlewareOptions : IAuthorizationOptions
6262
/// </summary>
6363
public bool ReadExtensionsFromQueryString { get; set; } = true;
6464

65+
/// <summary>
66+
/// Gets or sets a list of the authentication schemes the authentication requirements are evaluated against.
67+
/// When no schemes are specified, the default authentication scheme is used.
68+
/// </summary>
69+
public List<string> AuthenticationSchemes { get; set; } = new();
70+
6571
/// <inheritdoc/>
6672
/// <remarks>
6773
/// HTTP requests return <c>401 Forbidden</c> when the request is not authenticated.
+72
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
// source: https://github.com/dotnet/aspnetcore/blob/main/src/Shared/SecurityHelper/SecurityHelper.cs
2+
// permalink: https://github.com/dotnet/aspnetcore/blob/8b2fd3f7a3b3e18afc6f63c4a494cc733dcced64/src/Shared/SecurityHelper/SecurityHelper.cs
3+
// retrieved: 2023-07-05
4+
5+
// Licensed to the .NET Foundation under one or more agreements.
6+
// The .NET Foundation licenses this file to you under the MIT license.
7+
8+
/*
9+
10+
The MIT License (MIT)
11+
12+
Copyright (c) .NET Foundation and Contributors
13+
14+
All rights reserved.
15+
16+
Permission is hereby granted, free of charge, to any person obtaining a copy
17+
of this software and associated documentation files (the "Software"), to deal
18+
in the Software without restriction, including without limitation the rights
19+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
20+
copies of the Software, and to permit persons to whom the Software is
21+
furnished to do so, subject to the following conditions:
22+
23+
The above copyright notice and this permission notice shall be included in all
24+
copies or substantial portions of the Software.
25+
26+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
27+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
28+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
29+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
30+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
31+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
32+
SOFTWARE.
33+
34+
*/
35+
36+
using System.Security.Claims;
37+
38+
namespace GraphQL.AspNetCore3;
39+
40+
/// <summary>
41+
/// Helper code used when implementing authentication middleware
42+
/// </summary>
43+
internal static class SecurityHelper
44+
{
45+
/// <summary>
46+
/// Add all ClaimsIdentities from an additional ClaimPrincipal to the ClaimsPrincipal
47+
/// Merges a new claims principal, placing all new identities first, and eliminating
48+
/// any empty unauthenticated identities from context.User
49+
/// </summary>
50+
/// <param name="existingPrincipal">The <see cref="ClaimsPrincipal"/> containing existing <see cref="ClaimsIdentity"/>.</param>
51+
/// <param name="additionalPrincipal">The <see cref="ClaimsPrincipal"/> containing <see cref="ClaimsIdentity"/> to be added.</param>
52+
public static ClaimsPrincipal MergeUserPrincipal(ClaimsPrincipal? existingPrincipal, ClaimsPrincipal? additionalPrincipal)
53+
{
54+
// For the first principal, just use the new principal rather than copying it
55+
if (existingPrincipal == null && additionalPrincipal != null) {
56+
return additionalPrincipal;
57+
}
58+
59+
var newPrincipal = new ClaimsPrincipal();
60+
61+
// New principal identities go first
62+
if (additionalPrincipal != null) {
63+
newPrincipal.AddIdentities(additionalPrincipal.Identities);
64+
}
65+
66+
// Then add any existing non empty or authenticated identities
67+
if (existingPrincipal != null) {
68+
newPrincipal.AddIdentities(existingPrincipal.Identities.Where(i => i.IsAuthenticated || i.Claims.Any()));
69+
}
70+
return newPrincipal;
71+
}
72+
}

src/Tests.ApiApprovals/GraphQL.AspNetCore3.approved.txt

+1
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,7 @@ namespace GraphQL.AspNetCore3
141141
public class GraphQLHttpMiddlewareOptions : GraphQL.AspNetCore3.IAuthorizationOptions
142142
{
143143
public GraphQLHttpMiddlewareOptions() { }
144+
public System.Collections.Generic.List<string> AuthenticationSchemes { get; set; }
144145
public bool AuthorizationRequired { get; set; }
145146
public string? AuthorizedPolicy { get; set; }
146147
public System.Collections.Generic.List<string> AuthorizedRoles { get; set; }

src/Tests/Middleware/AuthorizationTests.cs

+89-2
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
using System.Security.Claims;
44
using GraphQL.AspNetCore3.Errors;
55
using GraphQL.Execution;
6+
using Microsoft.AspNetCore.Authentication.Cookies;
67
using Microsoft.AspNetCore.Authentication.JwtBearer;
78
using Microsoft.Extensions.Hosting;
89

@@ -12,9 +13,14 @@ public class AuthorizationTests
1213
{
1314
private GraphQLHttpMiddlewareOptions _options = null!;
1415
private bool _enableCustomErrorInfoProvider;
15-
private readonly TestServer _server;
16+
private TestServer _server;
1617

1718
public AuthorizationTests()
19+
{
20+
_server = CreateServer();
21+
}
22+
23+
private TestServer CreateServer(Action<IServiceCollection>? configureServices = null)
1824
{
1925
var hostBuilder = new WebHostBuilder();
2026
hostBuilder.ConfigureServices(services => {
@@ -42,6 +48,7 @@ public AuthorizationTests()
4248
#if NETCOREAPP2_1 || NET48
4349
services.AddHostApplicationLifetime();
4450
#endif
51+
configureServices?.Invoke(services);
4552
});
4653
hostBuilder.Configure(app => {
4754
app.UseWebSockets();
@@ -53,7 +60,7 @@ public AuthorizationTests()
5360
_options = opts;
5461
});
5562
});
56-
_server = new TestServer(hostBuilder);
63+
return new TestServer(hostBuilder);
5764
}
5865

5966
private string CreateJwtToken()
@@ -254,6 +261,86 @@ public async Task Authorized_Policy()
254261
actual.ShouldBe(@"{""data"":{""__typename"":""Query""}}");
255262
}
256263

264+
[Fact]
265+
public async Task NotAuthorized_WrongScheme()
266+
{
267+
_server = CreateServer(services => {
268+
services.AddAuthentication(CookieAuthenticationDefaults.AuthenticationScheme); // change default scheme to Cookie authentication
269+
});
270+
_options.AuthorizationRequired = true;
271+
using var response = await PostQueryAsync("{ __typename }", true); // send an authenticated request (with JWT bearer scheme)
272+
response.StatusCode.ShouldBe(HttpStatusCode.Unauthorized);
273+
var actual = await response.Content.ReadAsStringAsync();
274+
actual.ShouldBe(@"{""errors"":[{""message"":""Access denied for schema."",""extensions"":{""code"":""ACCESS_DENIED"",""codes"":[""ACCESS_DENIED""]}}]}");
275+
}
276+
277+
[Fact]
278+
public async Task NotAuthorized_WrongScheme_2()
279+
{
280+
_server.Dispose();
281+
_server = CreateServer(services => {
282+
services.AddAuthentication().AddCookie(); // add Cookie authentication
283+
});
284+
_options.AuthorizationRequired = true;
285+
_options.AuthenticationSchemes.Add(CookieAuthenticationDefaults.AuthenticationScheme); // change authentication scheme for GraphQL requests to Cookie (which is not used by the test client)
286+
using var response = await PostQueryAsync("{ __typename }", true); // send an authenticated request (with JWT bearer scheme)
287+
response.StatusCode.ShouldBe(HttpStatusCode.Unauthorized);
288+
var actual = await response.Content.ReadAsStringAsync();
289+
actual.ShouldBe(@"{""errors"":[{""message"":""Access denied for schema."",""extensions"":{""code"":""ACCESS_DENIED"",""codes"":[""ACCESS_DENIED""]}}]}");
290+
}
291+
292+
[Fact]
293+
public async Task NotAuthorized_WrongScheme_VerifyUser()
294+
{
295+
bool validatedUser = false;
296+
_server = CreateServer(services => {
297+
services.AddAuthentication(CookieAuthenticationDefaults.AuthenticationScheme); // change default scheme to Cookie authentication
298+
services.AddGraphQL(b => b
299+
.ConfigureExecutionOptions(opts => {
300+
opts.User.ShouldNotBeNull().Identity.ShouldNotBeNull().IsAuthenticated.ShouldBeFalse();
301+
validatedUser = true;
302+
}));
303+
});
304+
_options.AuthorizationRequired = false; // disable authorization requirements; we just want to verify that an anonymous user is passed to the execution options
305+
using var response = await PostQueryAsync("{ __typename }", true); // send an authenticated request (with JWT bearer scheme)
306+
response.StatusCode.ShouldBe(HttpStatusCode.OK);
307+
var actual = await response.Content.ReadAsStringAsync();
308+
actual.ShouldBe(@"{""data"":{""__typename"":""Query""}}");
309+
validatedUser.ShouldBeTrue();
310+
}
311+
312+
[Fact]
313+
public async Task Authorized_DifferentScheme()
314+
{
315+
bool validatedUser = false;
316+
_server = CreateServer(services => {
317+
services.AddAuthentication(CookieAuthenticationDefaults.AuthenticationScheme); // change default scheme to Cookie authentication
318+
services.AddGraphQL(b => b.ConfigureExecutionOptions(opts => {
319+
opts.User.ShouldNotBeNull().Identity.ShouldNotBeNull().IsAuthenticated.ShouldBeTrue();
320+
validatedUser = true;
321+
}));
322+
});
323+
_options.AuthorizationRequired = true;
324+
_options.AuthenticationSchemes.Add(JwtBearerDefaults.AuthenticationScheme);
325+
using var response = await PostQueryAsync("{ __typename }", true);
326+
response.StatusCode.ShouldBe(HttpStatusCode.OK);
327+
var actual = await response.Content.ReadAsStringAsync();
328+
actual.ShouldBe(@"{""data"":{""__typename"":""Query""}}");
329+
validatedUser.ShouldBeTrue();
330+
}
331+
332+
[Fact]
333+
public void SecurityHelperTests()
334+
{
335+
SecurityHelper.MergeUserPrincipal(null, null).ShouldNotBeNull().Identity.ShouldBeNull(); // Note that ASP.NET Core does not return null for anonymous user
336+
var principal1 = new ClaimsPrincipal(new ClaimsIdentity()); // empty identity for primary identity (default for ASP.NET Core)
337+
SecurityHelper.MergeUserPrincipal(null, principal1).ShouldBe(principal1);
338+
var principal2 = new ClaimsPrincipal(new ClaimsIdentity("test1")); // non-empty identity for secondary identity
339+
SecurityHelper.MergeUserPrincipal(principal1, principal2).Identities.ShouldHaveSingleItem().AuthenticationType.ShouldBe("test1");
340+
var principal3 = new ClaimsPrincipal(new ClaimsIdentity("test2")); // merge two non-empty identities together
341+
SecurityHelper.MergeUserPrincipal(principal2, principal3).Identities.Select(x => x.AuthenticationType).ShouldBe(new[] { "test2", "test1" }); // last one wins
342+
}
343+
257344
private class CustomErrorInfoProvider : ErrorInfoProvider
258345
{
259346
private readonly AuthorizationTests _authorizationTests;

src/Tests/Tests.csproj

+1
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@
2626
<ProjectReference Include="..\Samples\ChatSchema\Chat.csproj" />
2727
<ProjectReference Include="..\GraphQL.AspNetCore3\GraphQL.AspNetCore3.csproj" />
2828
<PackageReference Include="GraphQL.SystemTextJson" Version="$(GraphQLVersion)" />
29+
<PackageReference Include="Microsoft.AspNetCore.Authentication.Cookies" Version="2.1.*" Condition="'$(TargetFramework)' == 'net48' OR '$(TargetFramework)' == 'netcoreapp2.1'" />
2930
</ItemGroup>
3031

3132
<ItemGroup>

0 commit comments

Comments
 (0)