mirror of
https://github.com/bitwarden/mobile
synced 2026-01-07 19:13:19 +00:00
* initial commit - add UsesKeyConnector to UserService - add models - begin work on authentication * finish auth workflow for key connector sso login - finish api call for get user key - start api calls for posts to key connector * Bypass lock page if already unlocked * Move logic to KeyConnectorService, log out if no pin or biometric is set * Disable password reprompt when using key connector * hide password reprompt checkbox when editing or adding cipher * add PostUserKey and PostSetKeyConnector calls * add ConvertMasterPasswordPage * add functionality to RemoveMasterPasswordPage - rename Convert to Remove * Hide Change Master Password button if using key connector * Add OTP verification for export component * Update src/App/Pages/Vault/AddEditPage.xaml.cs Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com> * remove toolbar item "close" * Update src/Core/Models/Request/KeyConnectorUserKeyRequest.cs Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com> * remove new line in resource string - format warning as two labels - set label in code behind for loading simultaneously * implement GetAndSetKey in KeyConnectorService - ignore EnvironmentService call * remove unnecesary orgIdentifier * move RemoveMasterPasswordPage call to LockPage * add spacing to export vault page * log out if no PIN or bio on lock page with key connector * Delete excessive whitespace * Delete excessive whitespace * Change capitalisation of OTP * add default value to models for backwards compatibility * remove this keyword * actually handle exceptions * move RemoveMasterPasswordPage to TabPage using messaging service * add minor improvements * remove 'this.' Co-authored-by: Hinton <oscar@oscarhinton.com> Co-authored-by: Thomas Rittson <trittson@bitwarden.com> Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com>
252 lines
7.5 KiB
C#
252 lines
7.5 KiB
C#
using Bit.Core.Abstractions;
|
|
using Bit.Core.Utilities;
|
|
using Newtonsoft.Json.Linq;
|
|
using System;
|
|
using System.Text;
|
|
using System.Threading.Tasks;
|
|
using System.Linq;
|
|
|
|
namespace Bit.Core.Services
|
|
{
|
|
public class TokenService : ITokenService
|
|
{
|
|
private readonly IStorageService _storageService;
|
|
|
|
private string _token;
|
|
private JObject _decodedToken;
|
|
private string _refreshToken;
|
|
|
|
private const string Keys_AccessToken = "accessToken";
|
|
private const string Keys_RefreshToken = "refreshToken";
|
|
private const string Keys_TwoFactorTokenFormat = "twoFactorToken_{0}";
|
|
|
|
public TokenService(IStorageService storageService)
|
|
{
|
|
_storageService = storageService;
|
|
}
|
|
|
|
public async Task SetTokensAsync(string accessToken, string refreshToken)
|
|
{
|
|
await Task.WhenAll(
|
|
SetTokenAsync(accessToken),
|
|
SetRefreshTokenAsync(refreshToken));
|
|
}
|
|
|
|
public async Task SetTokenAsync(string token)
|
|
{
|
|
_token = token;
|
|
_decodedToken = null;
|
|
|
|
if (await SkipTokenStorage())
|
|
{
|
|
// If we have a vault timeout and the action is log out, don't store token
|
|
return;
|
|
}
|
|
|
|
await _storageService.SaveAsync(Keys_AccessToken, token);
|
|
}
|
|
|
|
public async Task<string> GetTokenAsync()
|
|
{
|
|
if (_token != null)
|
|
{
|
|
return _token;
|
|
}
|
|
_token = await _storageService.GetAsync<string>(Keys_AccessToken);
|
|
return _token;
|
|
}
|
|
|
|
public async Task SetRefreshTokenAsync(string refreshToken)
|
|
{
|
|
_refreshToken = refreshToken;
|
|
|
|
if (await SkipTokenStorage())
|
|
{
|
|
// If we have a vault timeout and the action is log out, don't store token
|
|
return;
|
|
}
|
|
|
|
await _storageService.SaveAsync(Keys_RefreshToken, refreshToken);
|
|
}
|
|
|
|
public async Task<string> GetRefreshTokenAsync()
|
|
{
|
|
if (_refreshToken != null)
|
|
{
|
|
return _refreshToken;
|
|
}
|
|
_refreshToken = await _storageService.GetAsync<string>(Keys_RefreshToken);
|
|
return _refreshToken;
|
|
}
|
|
|
|
public async Task ToggleTokensAsync()
|
|
{
|
|
var token = await GetTokenAsync();
|
|
var refreshToken = await GetRefreshTokenAsync();
|
|
if (await SkipTokenStorage())
|
|
{
|
|
await ClearTokenAsync();
|
|
_token = token;
|
|
_refreshToken = refreshToken;
|
|
return;
|
|
}
|
|
|
|
await SetTokenAsync(token);
|
|
await SetRefreshTokenAsync(refreshToken);
|
|
}
|
|
|
|
public async Task SetTwoFactorTokenAsync(string token, string email)
|
|
{
|
|
await _storageService.SaveAsync(string.Format(Keys_TwoFactorTokenFormat, email), token);
|
|
}
|
|
|
|
public async Task<string> GetTwoFactorTokenAsync(string email)
|
|
{
|
|
return await _storageService.GetAsync<string>(string.Format(Keys_TwoFactorTokenFormat, email));
|
|
}
|
|
|
|
public async Task ClearTwoFactorTokenAsync(string email)
|
|
{
|
|
await _storageService.RemoveAsync(string.Format(Keys_TwoFactorTokenFormat, email));
|
|
}
|
|
|
|
public async Task ClearTokenAsync()
|
|
{
|
|
_token = null;
|
|
_decodedToken = null;
|
|
_refreshToken = null;
|
|
await Task.WhenAll(
|
|
_storageService.RemoveAsync(Keys_AccessToken),
|
|
_storageService.RemoveAsync(Keys_RefreshToken));
|
|
}
|
|
|
|
public JObject DecodeToken()
|
|
{
|
|
if (_decodedToken != null)
|
|
{
|
|
return _decodedToken;
|
|
}
|
|
if (_token == null)
|
|
{
|
|
throw new InvalidOperationException("Token not found.");
|
|
}
|
|
var parts = _token.Split('.');
|
|
if (parts.Length != 3)
|
|
{
|
|
throw new InvalidOperationException("JWT must have 3 parts.");
|
|
}
|
|
var decodedBytes = CoreHelpers.Base64UrlDecode(parts[1]);
|
|
if (decodedBytes == null || decodedBytes.Length < 1)
|
|
{
|
|
throw new InvalidOperationException("Cannot decode the token.");
|
|
}
|
|
_decodedToken = JObject.Parse(Encoding.UTF8.GetString(decodedBytes));
|
|
return _decodedToken;
|
|
}
|
|
|
|
public DateTime? GetTokenExpirationDate()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["exp"] == null)
|
|
{
|
|
return null;
|
|
}
|
|
return CoreHelpers.Epoc.AddSeconds(Convert.ToDouble(decoded["exp"].Value<long>()));
|
|
}
|
|
|
|
public int TokenSecondsRemaining()
|
|
{
|
|
var d = GetTokenExpirationDate();
|
|
if (d == null)
|
|
{
|
|
return 0;
|
|
}
|
|
var timeRemaining = d.Value - DateTime.UtcNow;
|
|
return (int)timeRemaining.TotalSeconds;
|
|
}
|
|
|
|
public bool TokenNeedsRefresh(int minutes = 5)
|
|
{
|
|
var sRemaining = TokenSecondsRemaining();
|
|
return sRemaining < (60 * minutes);
|
|
}
|
|
|
|
public string GetUserId()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["sub"] == null)
|
|
{
|
|
throw new Exception("No user id found.");
|
|
}
|
|
return decoded["sub"].Value<string>();
|
|
}
|
|
|
|
public string GetEmail()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["email"] == null)
|
|
{
|
|
throw new Exception("No email found.");
|
|
}
|
|
return decoded["email"].Value<string>();
|
|
}
|
|
|
|
public bool GetEmailVerified()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["email_verified"] == null)
|
|
{
|
|
throw new Exception("No email verification found.");
|
|
}
|
|
return decoded["email_verified"].Value<bool>();
|
|
}
|
|
|
|
public string GetName()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["name"] == null)
|
|
{
|
|
return null;
|
|
}
|
|
return decoded["name"].Value<string>();
|
|
}
|
|
|
|
public bool GetPremium()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["premium"] == null)
|
|
{
|
|
return false;
|
|
}
|
|
return decoded["premium"].Value<bool>();
|
|
}
|
|
|
|
public string GetIssuer()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["iss"] == null)
|
|
{
|
|
throw new Exception("No issuer found.");
|
|
}
|
|
return decoded["iss"].Value<string>();
|
|
}
|
|
|
|
public bool GetIsExternal()
|
|
{
|
|
var decoded = DecodeToken();
|
|
if (decoded?["amr"] == null)
|
|
{
|
|
return false;
|
|
}
|
|
return decoded["amr"].Value<JArray>().Any(t => t.Value<string>() == "external");
|
|
}
|
|
|
|
private async Task<bool> SkipTokenStorage()
|
|
{
|
|
var timeout = await _storageService.GetAsync<int?>(Constants.VaultTimeoutKey);
|
|
var action = await _storageService.GetAsync<string>(Constants.VaultTimeoutActionKey);
|
|
return timeout.HasValue && action == "logOut";
|
|
}
|
|
}
|
|
}
|