protected override async Task <AuthenticationTicket> AuthenticateCoreAsync() { AuthenticationProperties properties = null; try { string code = null; string state = null; var query = Request.Query; var values = query.GetValues("code"); if (values != null && values.Count == 1) { code = values[0]; } values = query.GetValues("state"); if (values != null && values.Count == 1) { state = values[0]; } properties = Options.StateDataFormat.Unprotect(state); if (properties == null) { return(null); } // OAuth2 10.12 CSRF if (!ValidateCorrelationId(properties, _logger)) { return(new AuthenticationTicket(null, properties)); } var requestPrefix = Request.Scheme + "://" + Request.Host; var redirectUri = requestPrefix + Request.PathBase + Options.CallbackPath; // Build up the body for the token request var body = new List <KeyValuePair <string, string> > { new KeyValuePair <string, string>("grant_type", "authorization_code"), new KeyValuePair <string, string>("client_id", Options.ClientId), new KeyValuePair <string, string>("client_secret", Options.ClientSecret), new KeyValuePair <string, string>("redirect_uri", redirectUri), new KeyValuePair <string, string>("code", code) }; /*Your app makes a POST request to https://app..com/-/oauth_token, passing the parameters as part of a standard form-encoded post body. * grant_type - required Must be authorization_code * client_id - required The Client ID uniquely identifies the application making the request. * client_secret - required The Client Secret belonging to the app, found in the details pane of the developer view * redirect_uri - required Must match the redirect_uri specified in the original request * code - required The code you are exchanging for an auth token */ // Request the token var requestMessage = new HttpRequestMessage(HttpMethod.Post, Options.Endpoints.TokenEndpoint); requestMessage.Headers.Accept.Add(new MediaTypeWithQualityHeaderValue("application/json")); requestMessage.Content = new FormUrlEncodedContent(body); var tokenResponse = await _httpClient.SendAsync(requestMessage); tokenResponse.EnsureSuccessStatusCode(); var text = await tokenResponse.Content.ReadAsStringAsync(); // Deserializes the token response dynamic response = JsonConvert.DeserializeObject <dynamic>(text); var accessToken = (string)response.access_token; /* * In the response, you will receive a JSON payload with the following parameters: * access_token - The token to use in future requests against the API * expires_in - The number of seconds the token is valid, typically 3600 (one hour) * token_type - The type of token, in our case, bearer * refresh_token - If exchanging a code, a long-lived token that can be used to get new access tokens when old ones expire. * data - A JSON object encoding a few key fields about the logged-in user, currently id, name, and email. */ // Get the GitHub user var userRequest = new HttpRequestMessage(HttpMethod.Get, Options.Endpoints.UserInfoEndpoint); userRequest.Headers.Accept.Add(new MediaTypeWithQualityHeaderValue("application/json")); userRequest.Headers.Add("Authorization", "Bearer " + accessToken); var userResponse = await _httpClient.SendAsync(userRequest, Request.CallCancelled); userResponse.EnsureSuccessStatusCode(); text = await userResponse.Content.ReadAsStringAsync(); dynamic user = JsonConvert.DeserializeObject <NoAuthIdentityResponse>(text); var context = new NoAuthAuthenticatedContext(Context, user, accessToken) { Identity = new ClaimsIdentity( Options.AuthenticationType, ClaimsIdentity.DefaultNameClaimType, ClaimsIdentity.DefaultRoleClaimType) }; if (!string.IsNullOrEmpty(context.Id)) { context.Identity.AddClaim(new Claim(ClaimTypes.NameIdentifier, context.Id, XmlSchemaString, Options.AuthenticationType)); } if (user.Claims != null) { foreach (Tuple <string, string> claim in user.Claims) { context.Identity.AddClaim(new Claim(claim.Item1, claim.Item2, XmlSchemaString, Options.AuthenticationType)); } } context.Properties = properties; await Options.Provider.Authenticated(context); return(new AuthenticationTicket(context.Identity, context.Properties)); } catch (Exception ex) { _logger.WriteError(ex.Message); } return(new AuthenticationTicket(null, properties)); }
/// <summary> /// Invoked whenever successfully authenticates a user /// </summary> /// <param name="context">Contains information about the login session as well as the user <see cref="System.Security.Claims.ClaimsIdentity"/>.</param> /// <returns>A <see cref="Task"/> representing the completed operation.</returns> public virtual Task Authenticated(NoAuthAuthenticatedContext context) { return(OnAuthenticated(context)); }