mirror of
https://github.com/bitwarden/server
synced 2026-01-11 13:03:27 +00:00
* fix(global-settings): [PM-26092] Token Refresh Doc Enhancement - Enhanced documentation and wording for token refresh.
96 lines
3.6 KiB
C#
96 lines
3.6 KiB
C#
// FIXME: Update this file to be null safe and then delete the line below
|
|
#nullable disable
|
|
|
|
using Bit.Core.Settings;
|
|
using Bit.Identity.IdentityServer.RequestValidators;
|
|
using Duende.IdentityServer.Models;
|
|
|
|
namespace Bit.Identity.IdentityServer;
|
|
|
|
public class ApiClient : Client
|
|
{
|
|
public ApiClient(
|
|
GlobalSettings globalSettings,
|
|
string id,
|
|
int refreshTokenSlidingDays,
|
|
int accessTokenLifetimeHours,
|
|
string[] scopes = null)
|
|
{
|
|
ClientId = id;
|
|
AllowedGrantTypes = new[] { GrantType.ResourceOwnerPassword, GrantType.AuthorizationCode, WebAuthnGrantValidator.GrantType };
|
|
|
|
// Use global setting: false = Sliding (default), true = Absolute
|
|
RefreshTokenExpiration = globalSettings.IdentityServer.ApplyAbsoluteExpirationOnRefreshToken
|
|
? TokenExpiration.Absolute
|
|
: TokenExpiration.Sliding;
|
|
|
|
RefreshTokenUsage = TokenUsage.ReUse;
|
|
|
|
// Use global setting if provided, otherwise use constructor parameter
|
|
SlidingRefreshTokenLifetime = globalSettings.IdentityServer.SlidingRefreshTokenLifetimeSeconds ?? (86400 * refreshTokenSlidingDays);
|
|
AbsoluteRefreshTokenLifetime = globalSettings.IdentityServer.AbsoluteRefreshTokenLifetimeSeconds ?? 0; // forever
|
|
|
|
UpdateAccessTokenClaimsOnRefresh = true;
|
|
AccessTokenLifetime = 3600 * accessTokenLifetimeHours;
|
|
AllowOfflineAccess = true;
|
|
|
|
RequireConsent = false;
|
|
RequirePkce = true;
|
|
RequireClientSecret = false;
|
|
if (id == "web")
|
|
{
|
|
RedirectUris = new[] { $"{globalSettings.BaseServiceUri.Vault}/sso-connector.html" };
|
|
PostLogoutRedirectUris = new[] { globalSettings.BaseServiceUri.Vault };
|
|
AllowedCorsOrigins = new[] { globalSettings.BaseServiceUri.Vault };
|
|
}
|
|
else if (id == "desktop")
|
|
{
|
|
var desktopUris = new List<string>();
|
|
desktopUris.Add("bitwarden://sso-callback");
|
|
for (var port = 8065; port <= 8070; port++)
|
|
{
|
|
desktopUris.Add(string.Format("http://localhost:{0}", port));
|
|
}
|
|
RedirectUris = desktopUris;
|
|
PostLogoutRedirectUris = new[] { "bitwarden://logged-out" };
|
|
}
|
|
else if (id == "connector")
|
|
{
|
|
var connectorUris = new List<string>();
|
|
for (var port = 8065; port <= 8070; port++)
|
|
{
|
|
connectorUris.Add(string.Format("http://localhost:{0}", port));
|
|
}
|
|
RedirectUris = connectorUris.Append("bwdc://sso-callback").ToList();
|
|
PostLogoutRedirectUris = connectorUris.Append("bwdc://logged-out").ToList();
|
|
}
|
|
else if (id == "browser")
|
|
{
|
|
RedirectUris = new[] { $"{globalSettings.BaseServiceUri.Vault}/sso-connector.html" };
|
|
PostLogoutRedirectUris = new[] { globalSettings.BaseServiceUri.Vault };
|
|
AllowedCorsOrigins = new[] { globalSettings.BaseServiceUri.Vault };
|
|
}
|
|
else if (id == "cli")
|
|
{
|
|
var cliUris = new List<string>();
|
|
for (var port = 8065; port <= 8070; port++)
|
|
{
|
|
cliUris.Add(string.Format("http://localhost:{0}", port));
|
|
}
|
|
RedirectUris = cliUris;
|
|
PostLogoutRedirectUris = cliUris;
|
|
}
|
|
else if (id == "mobile")
|
|
{
|
|
RedirectUris = new[] { "bitwarden://sso-callback" };
|
|
PostLogoutRedirectUris = new[] { "bitwarden://logged-out" };
|
|
}
|
|
|
|
if (scopes == null)
|
|
{
|
|
scopes = new string[] { "api" };
|
|
}
|
|
AllowedScopes = scopes;
|
|
}
|
|
}
|