//-----------------------------------------------------------------------
//
// Copyright (c) Outercurve Foundation. All rights reserved.
//
//-----------------------------------------------------------------------
namespace DotNetOpenAuth.OAuth2 {
using System;
using System.Collections.Generic;
using System.Diagnostics.Contracts;
using System.Linq;
using System.Security.Cryptography;
using System.Text;
using DotNetOpenAuth.Messaging;
using DotNetOpenAuth.Messaging.Bindings;
using DotNetOpenAuth.OAuth2.ChannelElements;
using DotNetOpenAuth.OAuth2.Messages;
///
/// Provides host-specific authorization server services needed by this library.
///
[ContractClass(typeof(IAuthorizationServerHostContract))]
public interface IAuthorizationServerHost {
///
/// Gets the store for storing crypto keys used to symmetrically encrypt and sign authorization codes and refresh tokens.
///
///
/// This store should be kept strictly confidential in the authorization server(s)
/// and NOT shared with the resource server. Anyone with these secrets can mint
/// tokens to essentially grant themselves access to anything they want.
///
ICryptoKeyStore CryptoKeyStore { get; }
///
/// Gets the authorization code nonce store to use to ensure that authorization codes can only be used once.
///
/// The authorization code nonce store.
INonceStore NonceStore { get; }
///
/// Acquires the access token and related parameters that go into the formulation of the token endpoint's response to a client.
///
/// Details regarding the resources that the access token will grant access to, and the identity of the client
/// that will receive that access.
/// Based on this information the receiving resource server can be determined and the lifetime of the access
/// token can be set based on the sensitivity of the resources.
///
/// A non-null parameters instance that DotNetOpenAuth will dispose after it has been used.
AccessTokenResult CreateAccessToken(IAccessTokenRequest accessTokenRequestMessage);
///
/// Gets the client with a given identifier.
///
/// The client identifier.
/// The client registration. Never null.
/// Thrown when no client with the given identifier is registered with this authorization server.
IClientDescription GetClient(string clientIdentifier);
///
/// Determines whether a described authorization is (still) valid.
///
/// The authorization.
///
/// true if the original authorization is still valid; otherwise, false.
///
///
/// When establishing that an authorization is still valid,
/// it's very important to only match on recorded authorizations that
/// meet these criteria:
/// 1) The client identifier matches.
/// 2) The user account matches.
/// 3) The scope on the recorded authorization must include all scopes in the given authorization.
/// 4) The date the recorded authorization was issued must be no later that the date the given authorization was issued.
/// One possible scenario is where the user authorized a client, later revoked authorization,
/// and even later reinstated authorization. This subsequent recorded authorization
/// would not satisfy requirement #4 in the above list. This is important because the revocation
/// the user went through should invalidate all previously issued tokens as a matter of
/// security in the event the user was revoking access in order to sever authorization on a stolen
/// account or piece of hardware in which the tokens were stored.
///
bool IsAuthorizationValid(IAuthorizationDescription authorization);
///
/// Determines whether a given set of resource owner credentials is valid based on the authorization server's user database
/// and if so records an authorization entry such that subsequent calls to would
/// return true.
///
/// Username on the account.
/// The user's password.
///
/// The access request the credentials came with.
/// This may be useful if the authorization server wishes to apply some policy based on the client that is making the request.
///
/// A value that describes the result of the authorization check.
///
/// May be thrown if the authorization server does not support the resource owner password credential grant type.
///
AutomatedUserAuthorizationCheckResponse CheckAuthorizeResourceOwnerCredentialGrant(string userName, string password, IAccessTokenRequest accessRequest);
///
/// Determines whether an access token request given a client credential grant should be authorized
/// and if so records an authorization entry such that subsequent calls to would
/// return true.
///
///
/// The access request the credentials came with.
/// This may be useful if the authorization server wishes to apply some policy based on the client that is making the request.
///
/// A value that describes the result of the authorization check.
///
/// May be thrown if the authorization server does not support the client credential grant type.
///
AutomatedAuthorizationCheckResponse CheckAuthorizeClientCredentialsGrant(IAccessTokenRequest accessRequest);
}
///
/// Code Contract for the interface.
///
[ContractClassFor(typeof(IAuthorizationServerHost))]
internal abstract class IAuthorizationServerHostContract : IAuthorizationServerHost {
///
/// Prevents a default instance of the class from being created.
///
private IAuthorizationServerHostContract() {
}
///
/// Gets the store for storeing crypto keys used to symmetrically encrypt and sign authorization codes and refresh tokens.
///
ICryptoKeyStore IAuthorizationServerHost.CryptoKeyStore {
get {
Contract.Ensures(Contract.Result() != null);
throw new NotImplementedException();
}
}
///
/// Gets the authorization code nonce store to use to ensure that authorization codes can only be used once.
///
/// The authorization code nonce store.
INonceStore IAuthorizationServerHost.NonceStore {
get {
Contract.Ensures(Contract.Result() != null);
throw new NotImplementedException();
}
}
///
/// Gets the client with a given identifier.
///
/// The client identifier.
/// The client registration. Never null.
/// Thrown when no client with the given identifier is registered with this authorization server.
IClientDescription IAuthorizationServerHost.GetClient(string clientIdentifier) {
Requires.NotNullOrEmpty(clientIdentifier, "clientIdentifier");
Contract.Ensures(Contract.Result() != null);
throw new NotImplementedException();
}
///
/// Determines whether a described authorization is (still) valid.
///
/// The authorization.
///
/// true if the original authorization is still valid; otherwise, false.
///
///
/// When establishing that an authorization is still valid,
/// it's very important to only match on recorded authorizations that
/// meet these criteria:
/// 1) The client identifier matches.
/// 2) The user account matches.
/// 3) The scope on the recorded authorization must include all scopes in the given authorization.
/// 4) The date the recorded authorization was issued must be no later that the date the given authorization was issued.
/// One possible scenario is where the user authorized a client, later revoked authorization,
/// and even later reinstated authorization. This subsequent recorded authorization
/// would not satisfy requirement #4 in the above list. This is important because the revocation
/// the user went through should invalidate all previously issued tokens as a matter of
/// security in the event the user was revoking access in order to sever authorization on a stolen
/// account or piece of hardware in which the tokens were stored.
///
bool IAuthorizationServerHost.IsAuthorizationValid(IAuthorizationDescription authorization) {
Requires.NotNull(authorization, "authorization");
throw new NotImplementedException();
}
///
/// Determines whether a given set of resource owner credentials is valid based on the authorization server's user database
/// and if so records an authorization entry such that subsequent calls to would
/// return true.
///
/// Username on the account.
/// The user's password.
///
/// The access request the credentials came with.
/// This may be useful if the authorization server wishes to apply some policy based on the client that is making the request.
///
///
/// A value that describes the result of the authorization check.
///
///
/// May be thrown if the authorization server does not support the resource owner password credential grant type.
///
AutomatedUserAuthorizationCheckResponse IAuthorizationServerHost.CheckAuthorizeResourceOwnerCredentialGrant(string userName, string password, IAccessTokenRequest accessRequest) {
Contract.Requires(!string.IsNullOrEmpty(userName));
Contract.Requires(password != null);
Contract.Requires(accessRequest != null);
Contract.Ensures(Contract.Result() != null);
throw new NotImplementedException();
}
///
/// Determines whether an access token request given a client credential grant should be authorized
/// and if so records an authorization entry such that subsequent calls to would
/// return true.
///
/// The access request the credentials came with.
/// This may be useful if the authorization server wishes to apply some policy based on the client that is making the request.
///
/// A value that describes the result of the authorization check.
///
/// May be thrown if the authorization server does not support the client credential grant type.
AutomatedAuthorizationCheckResponse IAuthorizationServerHost.CheckAuthorizeClientCredentialsGrant(IAccessTokenRequest accessRequest) {
Contract.Requires(accessRequest != null);
Contract.Ensures(Contract.Result() != null);
throw new NotImplementedException();
}
///
/// Obtains parameters to go into the formulation of an access token.
///
/// Details regarding the resources that the access token will grant access to, and the identity of the client
/// that will receive that access.
/// Based on this information the receiving resource server can be determined and the lifetime of the access
/// token can be set based on the sensitivity of the resources.
///
/// A non-null parameters instance that DotNetOpenAuth will dispose after it has been used.
///
AccessTokenResult IAuthorizationServerHost.CreateAccessToken(IAccessTokenRequest accessTokenRequestMessage) {
Contract.Requires(accessTokenRequestMessage != null);
Contract.Ensures(Contract.Result() != null);
throw new NotImplementedException();
}
}
}